Enhanced E-Voting Protocol Based on Public Key Cryptography

被引:0
作者
Almimi, Hani M. [1 ]
Shahin, Samar A. [2 ]
Daoud, Mohammad Sh [3 ]
Al Fayoumi, Mustafa [2 ]
Ghadi, Yazeed [3 ]
机构
[1] Al Zaytoonah Univ Jordan, Dept Comp Sci, Amman, Jordan
[2] Princes Sumaya Univ Technol, King Hussein Sch Comp Sci, Amman, Jordan
[3] Al Ain Univ, Fac Engn, Abu Dhabi, U Arab Emirates
来源
2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT) | 2019年
关键词
E-Voting; E-Voting System; E-Government; Election; Certificate; Authentication;
D O I
10.1109/acit47987.2019.8990991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an e-voting protocol to allow voting to be done from any location and still abide with the laws of security including identification, authentication, integrity, and anonymity. The proposed method relies on public key encryption that uses two pairs of certificates one for citizens containing private/public key pairs and the second for National Information Technology Center (NITC) that also contains private/public key pairs. NITC will be acting as a trusted certificate authority by to citizens and government. It is considered an objective and neutral unprejudiced party where no other governmental party has authority upon elections and is auditable by the independent election commission.
引用
收藏
页码:218 / 221
页数:4
相关论文
共 50 条
[21]   Anonymous and formally verified dual signature based online e-voting protocol [J].
Malik Najmus Saqib ;
Junaid Kiani ;
Basit Shahzad ;
Adeel Anjum ;
Saif ur Rehman Malik ;
Naveed Ahmad ;
Atta ur Rehman Khan .
Cluster Computing, 2019, 22 :1703-1716
[22]   E-Voting System Evaluation Based on The Council of Europe Recommendations: Helios Voting [J].
Panizo Alonso, Luis ;
Gasco, Mila ;
Marcos del Blanco, David Y. ;
Hermida Alonso, Jose A. ;
Barrat, Jordi ;
Alaiz Moreton, Hector .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) :161-173
[23]   Enhanced secure interface for a portable e-voting terminal [J].
Zuquete, Andre .
SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, :529-537
[24]   E-Voting Systems [J].
Kuesters, Ralf .
SOFTWARE SYSTEMS SAFETY, 2014, 36 :135-164
[25]   Security in e-voting [J].
Kuesters, Ralf ;
Truderung, Tomasz .
IT-INFORMATION TECHNOLOGY, 2014, 56 (06) :300-306
[26]   E-Voting on the Blockchain [J].
Curran, Kevin .
JOURNAL OF THE BRITISH BLOCKCHAIN ASSOCIATION, 2018, 1 (02)
[27]   FOO e-Voting Protocol: Inductive Analysis of the Eligibility Property [J].
Miramirkhani, N. S. ;
Jalili, R. ;
Yarmohamadi, M. .
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, :128-134
[28]   A distributed architecture proposal for e-voting [J].
Soares, Joao Marcos ;
Vasconcelos, Rafael Oliveira .
TEXTO LIVRE-LINGUAGEM E TECNOLOGIA, 2023, 16
[29]   A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA [J].
Kayode, Akintoye A. ;
Araoye, Olalekan .
JURNAL TEKNOLOGI, 2015, 77 (13) :87-91
[30]   An Extension of QSL for E-voting Systems [J].
Zhou, Yuan ;
Gao, Hongbiao ;
Cheng, Jingde .
ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 :87-96