Enhanced E-Voting Protocol Based on Public Key Cryptography

被引:0
作者
Almimi, Hani M. [1 ]
Shahin, Samar A. [2 ]
Daoud, Mohammad Sh [3 ]
Al Fayoumi, Mustafa [2 ]
Ghadi, Yazeed [3 ]
机构
[1] Al Zaytoonah Univ Jordan, Dept Comp Sci, Amman, Jordan
[2] Princes Sumaya Univ Technol, King Hussein Sch Comp Sci, Amman, Jordan
[3] Al Ain Univ, Fac Engn, Abu Dhabi, U Arab Emirates
来源
2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT) | 2019年
关键词
E-Voting; E-Voting System; E-Government; Election; Certificate; Authentication;
D O I
10.1109/acit47987.2019.8990991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an e-voting protocol to allow voting to be done from any location and still abide with the laws of security including identification, authentication, integrity, and anonymity. The proposed method relies on public key encryption that uses two pairs of certificates one for citizens containing private/public key pairs and the second for National Information Technology Center (NITC) that also contains private/public key pairs. NITC will be acting as a trusted certificate authority by to citizens and government. It is considered an objective and neutral unprejudiced party where no other governmental party has authority upon elections and is auditable by the independent election commission.
引用
收藏
页码:218 / 221
页数:4
相关论文
共 50 条
[31]   A Survey of Blockchain Based on E-voting Systems [J].
Abuidris, Yousif ;
Kumar, Rajesh ;
Wenyong, Wang .
ICBTA 2019: 2019 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, 2019, :99-104
[32]   An E-Voting System Based on Tornado Cash [J].
Bistarelli, Stefano ;
Montalvo, Bruno Lazo La Torre ;
Mercanti, Ivan ;
Santini, Francesco .
EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022, 2023, 13782 :120-135
[33]   A Study on the Ubiquitous e-Voting System for the Implementation of e-Government [J].
Kim, Choong Sik ;
Jung, Chang Duk ;
Hai, Seo Yeong ;
Park, Chan Hyuk .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04) :167-175
[34]   The security analysis of e-voting in Japan [J].
Hisamitsu, Hiroki ;
Takeda, Keiji .
E-VOTING AND IDENTITY, 2007, 4896 :99-110
[35]   Browser based agile e-voting system [J].
Simhalu, Sriperumbuduru Kandala ;
Takeda, Keiji .
ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 :62-69
[36]   E-Voting System Using Visual Cryptography & Secure Multi-party Computation [J].
Naidu, P. Sanyasi ;
Kharat, Reena ;
Tekade, Ruchita ;
Mendhe, Pallavi ;
Magade, Varsha .
2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
[37]   E-VOTING SYSTEMS: A TOOL FOR E-DEMOCRACY [J].
Abu-Shanab, Emad ;
Knight, Michael ;
Refai, Heba .
MANAGEMENT RESEARCH AND PRACTICE, 2010, 2 (03) :264-274
[38]   Improving the End-to-End Protection in E-Voting Using BVM-Blockchain-Based E-Voting Mechanism [J].
Gupta, Sweta ;
Gupta, Kamlesh Kumar ;
Shukla, Piyush Kumar .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (02)
[39]   An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function [J].
Gao, Shiyao ;
Zheng, Dong ;
Guo, Rui ;
Jing, Chunming ;
Hu, Chencheng .
IEEE ACCESS, 2019, 7 :115304-115316
[40]   The Future of E-voting in Australia [J].
Buckland, Richard ;
Wen, Roland .
IEEE SECURITY & PRIVACY, 2012, 10 (05) :25-32