E-Voting System Research Papers - Academia.edu (original) (raw)
2025
Security around electronic systems is not only sensitive, but also remains contentious among key election stake-holders. Various cryptographic primitives have been adopted in e-voting systems to infuse confidentiality, integrity and... more
Security around electronic systems is not only sensitive, but also remains contentious among key election stake-holders. Various cryptographic primitives have been adopted in e-voting systems to infuse confidentiality, integrity and availability, in order to entrench trust among to all stakeholders. However, the cryptographic techniques have not been well understood by the voters, candidates as well as other key election stake-holders. Presenting the mode of operation, the extent of providing security as well as the limitations of individual cryptographic primitive goes a long way to ensure that the security techniques are well understood by all stakeholders. This review looked into various cryptographic primitives applied in e-voting systems, how they achieve security, their strengths and limitations.
2025
It is often said that election processes depend on trust for their legitimacy. Trust is therefore crucial to the sustainability of democracy. It also seems clear that patterns and forms of trust in Western democracies are changing in... more
It is often said that election processes depend on trust for their legitimacy. Trust is therefore crucial to the sustainability of democracy. It also seems clear that patterns and forms of trust in Western democracies are changing in tandem with digitalization. This paper explores some possible inflections of the concept of trust in the 'age of digitalization' by examining its articulation by computer scientists doing research on digital voting and by contrasting these articulations with a Science and Technology Studies (STS) analysis of trust in the Danish voting process. The motivation for characterizing and discussing these views of trust, is that it matters deeply how trust is conceptualized in relation to voting, democracy and beyond, and that today computer science as an engineering, scientific and intellectual field increasingly affects how we perceive of trustindeed, how we organize social life and come to think about the world we live in. If Digitalization appears to be implicated in the current transformation of trust, then the questions of how trust is defined, by whom, and with what implications are open and acute matters in need of more general awareness and careful attentention.
2025
It is often said that election processes depend on trust for their legitimacy. Trust is therefore crucial to the sustainability of democracy. It also seems clear that patterns and forms of trust in Western democracies are changing in... more
It is often said that election processes depend on trust for their legitimacy. Trust is therefore crucial to the sustainability of democracy. It also seems clear that patterns and forms of trust in Western democracies are changing in tandem with digitalization. This paper explores some possible inflections of the concept of trust in the 'age of digitalization' by examining its articulation by computer scientists doing research on digital voting and by contrasting these articulations with a Science and Technology Studies (STS) analysis of trust in the Danish voting process. The motivation for characterizing and discussing these views of trust, is that it matters deeply how trust is conceptualized in relation to voting, democracy and beyond, and that today computer science as an engineering, scientific and intellectual field increasingly affects how we perceive of trustindeed, how we organize social life and come to think about the world we live in. If Digitalization appears to be implicated in the current transformation of trust, then the questions of how trust is defined, by whom, and with what implications are open and acute matters in need of more general awareness and careful attentention.
2024, HAL (Le Centre pour la Communication Scientifique Directe)
Experience shows that the best technology is not always adopted. In the security arena no technology has to stand a harder challenge or has higher consequences for changing society by failure than voting technology. Best technology in... more
Experience shows that the best technology is not always adopted. In the security arena no technology has to stand a harder challenge or has higher consequences for changing society by failure than voting technology. Best technology in voting is defined by accuracy, security, and integrity. But trust prescribes what technology we use. In practice, voting technology choices are driven by what people are politically comfortable with or by initiatives administrators can take trying out technology someone has made for them. This paper analyses how this kind of "trust" plays out: its influencers and consequences, such as a negative trust-legitimacy-participationincentive loop. The paper then lays out problems that developers of improved systems face. The analysis is underscored by examples, especially drawing from issues faced by a recent experiment on the implementation of multiple voting systems in parallel. CCS CONCEPTS • Applied computing → Voting / election technologies; • Humancentered computing → User studies;
2024
We thank Josep Reniu for his comments. This paper is based in part on a presentation Alvarez provided as part of "Democracia Electoral: Hacia Una Nueva Agenda", Instituto Electoral Veracruzano: Xalapa, MX, October 16, 2009. Alvarez thanks... more
We thank Josep Reniu for his comments. This paper is based in part on a presentation Alvarez provided as part of "Democracia Electoral: Hacia Una Nueva Agenda", Instituto Electoral Veracruzano: Xalapa, MX, October 16, 2009. Alvarez thanks Alfonso Ayala and Nathanial Persily for their comments about the presentation, and workshop participants for their questions and comments. Alvarez also thanks the Carnegie Corporation of New York, John S. and James L. Knight Foundation, and the Pew Charitable Trusts for their support of the research discussed in this paper.
2024, International journal of computer applications
e-Governance is refers to the use of Information and communication technology to provide the improvement in government services, transactions, interaction with citizens, business and other arm of government. In this paper we identify the... more
e-Governance is refers to the use of Information and communication technology to provide the improvement in government services, transactions, interaction with citizens, business and other arm of government. In this paper we identify the requirements of biometrics in e-governance and what are the possible attacks on biometric systems. We also provide some scheme to reduce the vulnerabilities in the system. We suggest implementing multibiometric system and methods for template protection to make system more robust.
2024
Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines,... more
Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric s...
2024, Jurnal Penelitian Pendidikan IPA
E-voting is a method of voting and vote counting in general elections using digital devices. There are still many errors and fraud that occur during village head elections in Indonesia. Then the idea was created to carry out village head... more
E-voting is a method of voting and vote counting in general elections using digital devices. There are still many errors and fraud that occur during village head elections in Indonesia. Then the idea was created to carry out village head elections by utilizing existing technological developments, especially Android-based smartphone technology. The data source used in this study is secondary data which uses population data of citizens who will exercise their right to vote, vote data for citizens' voting rights, and data from the results of vote acquisition during the village head election process. In this study, a number of important data were needed in the village head election process which was carried out using documentation techniques. This research produced an Android-based application system for securing e-voting data for village head elections using the AES-256 cryptographic algorithm called Vodes. The application produced in this study was built using the Kotlin programmi...
2024, INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on... more
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges. The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.
2024, Bulletin of Electrical Engineering and Informatics
Any democratic country intends to conduct the elections in a smooth and fair manner such all the citizens of the country participate and elect their leader who can involve himself/herself for the development of the country. Inspite of... more
Any democratic country intends to conduct the elections in a smooth and fair manner such all the citizens of the country participate and elect their leader who can involve himself/herself for the development of the country. Inspite of wide publicity and measures taken for ensuring the participation of all the citizens in the election process, most of the countries are unable achieve 100% voting rate in elections. Among the many reasons for reduction in voting rate, migration of the voters is one of the major reasons for reduction in voting rate. Even though technology and online services have been used in almost all the aspects of day-to-day activities, online features have not been utilized in the process of voting during elections. This paper tries to analyze the performance of the cloud based secured framework by implementing it using PHP and mySQL. Security of the framework is implemented using rivest shamir adleman (RSA), advanced encryption standard (AES) and Blowfish cryptogr...
2023, International Journal of Computer Trends and Technology
A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When a communication... more
A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When a communication system is designed in this manner, it is known as layered architecture. The OSI isn't a physical model, though. Rather, it's a set of guidelines that application developers used to create and implement application that run on a network. It also provides a framework for creating and implementing networking standards, devices, and internetworking schemes. This paper explains the OSI Reference Model, which comprises of seven different layers. Each layer is having its own responsibilities.
2023
With the help of Visual Cryptography (VC), it allows the voter to cast his vote from remote location even if the voter is absent in the voting place. It allows the voter to cast his vote securely and full confidentiality. System allows... more
With the help of Visual Cryptography (VC), it allows the voter to cast his vote from remote location even if the voter is absent in the voting place. It allows the voter to cast his vote securely and full confidentiality. System allows permission to the voter which is participated in the election only when he entered correct password which is generated using visual cryptography after stacking of two shares. System/Admin sends share 1 to voters email id before election and share 2 will be present during election for his login. From observing these two shares hackers can’t get any information. For this system we use 2 out of 2 visual cryptography scheme. It generates two shares even if the hackers get any one of the shares ,it is not possible to get the information about the second share which is send to the email id of the voter. Thus it provides two way security for efficiently use of internet voting system. For more security purpose Face Detection and Recognition system (FDR) is in...
2023
Now a day’s security is very essential because the fords are increasing day by day. Everywhere we need security. To provide security and to give access to the right person authentication is very important. In the traditional time for... more
Now a day’s security is very essential because the fords are increasing day by day. Everywhere we need security. To provide security and to give access to the right person authentication is very important. In the traditional time for authentication purpose we use password, pins but now a days theses authentication schemes are not sufficient. From this biometric is invented to provide the authentication. Biometrics deals with human’s physical as well as behavioral characteristics. The biometric data which is extracted from the human’s physical as well as behavioral characteristics is fingerprint, palm print, face, retina and so many. This biometric data is used for authentication and verification purpose and save in database as a biometric template. Mostly fingerprint is used as a biometric trait. To give access to the correct person is the great challenge to the biometric system. In this paper research is done on various biometric template security schemes. Initially the biometric i...
2023, International Journal for Scientific Research and Development
Marking attendance in colleges is generally a tedious effort on account of the increasing number of admissions. The process of attendance involves passing a sheet with the column for signature or a roll call at the end of the lecture. In... more
Marking attendance in colleges is generally a tedious effort on account of the increasing number of admissions. The process of attendance involves passing a sheet with the column for signature or a roll call at the end of the lecture. In the first scenario, the student may not receive the sheet and in the second may not be heard to the teacher. Also, the library system mainly consists of manual entry of book id by the librarian. Here the management of issued books becomes restricted. Lastly, colleges offer canteen services where physical money or coupons are used to buy the food item. Ticket printing and money handling is difficult to manage, leaving room for human error. In this paper, we propose a Smart Personalized Electromagnetic Card i.e. the NFC card which can be used to mark the attendance, issue a book and buy food items by a simple tap on the NFC enabled phone.
2023, Bulletin of Electrical Engineering and Informatics
Any democratic country intends to conduct the elections in a smooth and fair manner such all the citizens of the country participate and elect their leader who can involve himself/herself for the development of the country. Inspite of... more
Any democratic country intends to conduct the elections in a smooth and fair manner such all the citizens of the country participate and elect their leader who can involve himself/herself for the development of the country. Inspite of wide publicity and measures taken for ensuring the participation of all the citizens in the election process, most of the countries are unable achieve 100% voting rate in elections. Among the many reasons for reduction in voting rate, migration of the voters is one of the major reasons for reduction in voting rate. Even though technology and online services have been used in almost all the aspects of day-to-day activities, online features have not been utilized in the process of voting during elections. This paper tries to analyze the performance of the cloud based secured framework by implementing it using PHP and mySQL. Security of the framework is implemented using rivest shamir adleman (RSA), advanced encryption standard (AES) and Blowfish cryptography algorithms.
2023, International Journal for Research in Applied Science & Engineering Technology (IJRASET)
Since then, there have been some ways of voting. Around the world, paper ballots are the most common voting format. Only in the past ten years have electronic voting schemes gained popularity, and they remain unaddressed. E-voting systems... more
Since then, there have been some ways of voting. Around the world, paper ballots are the most common voting format. Only in the past ten years have electronic voting schemes gained popularity, and they remain unaddressed. E-voting systems have issues with security, reliability, openness, functionality and dependability. Estonia is the innovator in this area and might be regarded as the cutting edge. However, there aren't many alternatives that use blockchain. All of the aforementioned issues can be solved with blockchain, which also offers benefits like immutability and decentralization. The primary issues with blockchainbased technology used for electronic voting are their narrow focus or the lack of testing and comparability. We introduce an electronic voting system built on the blockchain that may be applied to any type of voting. Blockchain uses it to the fullest extent possible and has the capacity to manage all processes. After the voting process has begun, the platform behaves as though it is completely independent and decentralized, with no potential for interference. Although the data are completely transparent, homomorphic encryption protects the voters' identities. The main innovation of our solution is the fully decentralized management of the e-voting platform through blockchain, transparency of the entire process, and privacy and security of the voters thanks to homomorphic encryption.
2023, International Journal for Scientific Research and Development
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security... more
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both th...
2023, Lecture Notes in Computer Science
In this paper, we introduce a novel electronic voting protocol which is resistant to more powerful corrupted parties and coercers than any previous works. They can be the voting authorities inside the system who can steal voters'... more
In this paper, we introduce a novel electronic voting protocol which is resistant to more powerful corrupted parties and coercers than any previous works. They can be the voting authorities inside the system who can steal voters' information and the content of their votes, or the adversaries outside who try to buy the votes, and force voters to follow their wishes. The worst case is that the adversaries outside collude with all voting authorities inside to destroy the whole system. In previous works, authors suggested many complicated cryptographic techniques for fulfilling all security requirements of electronic voting protocol. However, they cannot avoid the sophisticated inside and outside collusion. Our proposal prevents these threats from happening by the combination of blind signature, dynamic ballots and other techniques. Moreover, the improvement of blind signature scheme together with the elimination of physical assumptions makes the newly proposed protocol faster and more efficient. These enhancements make some progress towards practical security solution for electronic voting system.
2023, International Journal of Engineering & Technology
In this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed. STCVS introduces an improvement methodology to the regular election systems. It could handle electronic ballots with multiple scopes at the... more
In this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed. STCVS introduces an improvement methodology to the regular election systems. It could handle electronic ballots with multiple scopes at the same time, e.g., presidential, parliamentary, local, amongst others. STCVS's design warrants well-secured identification and authentication processes for the voter via using voter's digital signatures, certificates. Also, it guarantees voting data protection via encryption. Tallying of the voting counts is achieved automatically; candidates recorded percentages are displayed as charts for the supervision trusted parties. STCVS eliminates counting errors, voting duplication, and vote attack raised in paper-based elections systems. Voting transparency is achieved through the election process steps to assure voting credibility. This is confirmed by a feedback e-mail that the voter receives after finalizing the voting process. In addition, the proposed system saves the huge budget required for authentication devices, Electronic Voting Machines (EVM) that consist similar voting systems. To evaluate the robustness and reliability of the proposed system, performance measurements were achieved by applying the Avalanche Effect (AE) tests. Results of these measurements show the degree of security and the performance of the proposed system.
2023, 2019 2nd International Conference on Safety Produce Informatization (IICSPI)
It was considered that the security of information is an important factor in an electoral process in a country; for the frequent problems that have been detected in the scanning of votes to expedite the count. The objective is to analyze... more
It was considered that the security of information is an important factor in an electoral process in a country; for the frequent problems that have been detected in the scanning of votes to expedite the count. The objective is to analyze a method of vote scanning that allows improving security, administration, and implementation so that vote counting is faster and more secure compared to the traditional voting system. The deductive method and the exploratory investigation were used to analyze the information of the articles of the reference. It turned out to be a prototype of a voting scan algorithm based on the OCR reader scanner that was proposed and analyzed; for the scanning of the votes and projection of results via the Internet for the next elections is to improve the integrity of the information. It was concluded that a prototype of an adequate algorithm for vote scanning is an alternative to improve a traditional system that will be integrated into a voting system.
2023, IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014
In any s e c u r i t y system, there are many security issues that are related to either the sender or the receiver of the message. Quantum computing has proven to be a plausible approach to solving many security issues such as... more
In any s e c u r i t y system, there are many security issues that are related to either the sender or the receiver of the message. Quantum computing has proven to be a plausible approach to solving many security issues such as eavesdropping, replay attack and man-in-the-middle attack. In t h e e-voting system, one of these issues has been solved, namely, the integrity of the data (ballot). In this paper, we propose a scheme that solves the problem of repudiation that could occur when the voter denies the value of the ballot either for cheating purposes or for a real change in the value by a third party. By using an entanglement concept between two parties randomly, the person who is going to verify the ballots will create the entangled state and keep it in a database to use it in the future for the purpose of the non-repudiation of any of these two voters.
2023, International Journal for Research in Applied Science and Engineering Technology
This paper presents the E-voting system using block chain, which is a multiplatform interface designed to cast votes which promises secure and transparent elections. The block chain provides a doubly linked hash structure of every vote... more
This paper presents the E-voting system using block chain, which is a multiplatform interface designed to cast votes which promises secure and transparent elections. The block chain provides a doubly linked hash structure of every vote cast, hence any tempering to it results in a new different structure so we can say that the links are immutable. Every vote cast is counted as a transaction with a unique hash address. A collection of rules known as smart contract is stored on block chain to speed the transaction. At the end, the total number of transactions are counted which turns out to be the actual results of the elections. This unique combination allows secure and user-friendly experience to the users at the same time.
2023, International Journal of Computer Trends and Technology
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers have undergone... more
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers have undergone many methodologies and techniques to secure software development life-cycle. A critical review for the development of secure software, Security and its usability is integrated at requirement specification process.
2023, International Journal of Computer Trends and Technology
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of securing data are... more
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of securing data are required. Information hiding plays a very crucial role today. It provided methods for encrypting the information so that it becomes unreadable for any unintended user. This paper reviews the techniques that exist for data hiding and how can these be combined to provide another level of security.
2023, Lecture Notes in Computer Science
Electronic voting (e-voting) systems can greatly enhance the efficiency, and potentially, the transparency of national elections. However, the security of such systems is an area of ongoing research. The literature for secure e-voting is... more
Electronic voting (e-voting) systems can greatly enhance the efficiency, and potentially, the transparency of national elections. However, the security of such systems is an area of ongoing research. The literature for secure e-voting is predominantly concerned with 1-out-of-m voting strategies, where m is the number of candidates running for the elections. This paper presents a case study of cryptologic protocols for secure e-voting systems that use preferential voting strategies.
2022
We thank Josep Reniu for his comments. This paper is based in part on a presentation Alvarez provided as part of "Democracia Electoral: Hacia Una Nueva Agenda", Instituto Electoral Veracruzano: Xalapa, MX, October 16, 2009. Alvarez thanks... more
We thank Josep Reniu for his comments. This paper is based in part on a presentation Alvarez provided as part of "Democracia Electoral: Hacia Una Nueva Agenda", Instituto Electoral Veracruzano: Xalapa, MX, October 16, 2009. Alvarez thanks Alfonso Ayala and Nathanial Persily for their comments about the presentation, and workshop participants for their questions and comments. Alvarez also thanks the Carnegie Corporation of New York, John S. and James L. Knight Foundation, and the Pew Charitable Trusts for their support of the research discussed in this paper.
2022, Contemporary Issues in Information Systems - A Global Perspective
The covid-19 pandemic has brought about new ways of conducting business through the use of Information Communication Technologies and elections have not been spared either. Internet voting is another form of strengthening democracy... more
The covid-19 pandemic has brought about new ways of conducting business through the use of Information Communication Technologies and elections have not been spared either. Internet voting is another form of strengthening democracy through the use of Information Communication Technologies. Africa lags in the implementation of electronic voting, especially Internet voting. This chapter applied a critical socio-technical analysis that analyses factors that influence the applicability of Internet voting within the African context. The researcher applied desktop research which included 30 journals to gather data from the Internet and other documentation sources. The findings reveal that decision-makers can partially implement Internet voting in some of the countries in Africa like Kenya, Libya, Nigeria, Morocco, Mauritius, Tunisia, and Seychelles. To successfully implement Internet voting, the decision-makers in African nations have to fully invest in the Information Communication Techn...
2022
Nigeria is known with tedious activities and time consuming. There is a serious problem in terms of delivering the electoral facilities to the voting station and securing such facilities. even before this activities there must be training... more
Nigeria is known with tedious activities and time consuming. There is a serious problem in terms of delivering the electoral facilities to the voting station and securing such facilities. even before this activities there must be training of personal that will be involve in such exercise with involve huge amount of money and time consuming. it is in line with this problem the researcher intend to develop an online electronic voting systems to checkmate those problems. Each voter will be screen for eligibility, thereafter the information will be store in database so that at any time the voter can login and cast his/her vote and monitor the result online. Whenever a voter cast a vote the systems will automatically saves all his records including the ballot, username, address and password for future references. an administrator will then be able to monitor all the process and check for any illegal actions. This systems if put into use will increase transparency an accountability as the observer can monitor all the activities during the registration/poling exercise.
2022, INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on... more
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges. The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.
2022, International Journal for Research in Applied Science & Engineering Technology (IJRASET)
This paper presents the E-voting system using block chain, which is a multiplatform interface designed to cast votes which promises secure and transparent elections. The block chain provides a doubly linked hash structure of every vote... more
This paper presents the E-voting system using block chain, which is a multiplatform interface designed to cast votes which promises secure and transparent elections. The block chain provides a doubly linked hash structure of every vote cast, hence any tempering to it results in a new different structure so we can say that the links are immutable. Every vote cast is counted as a transaction with a unique hash address. A collection of rules known as smart contract is stored on block chain to speed the transaction. At the end, the total number of transactions are counted which turns out to be the actual results of the elections. This unique combination allows secure and user-friendly experience to the users at the same time.
2022, Jurnal Teknologi dan Sistem Komputer
In the campaign period of regional heads election, fraud can occur, such as money politics, blaming campaign facilities, campaign time violations, and black campaign. This study implemented a secure SMS application for election fraud... more
In the campaign period of regional heads election, fraud can occur, such as money politics, blaming campaign facilities, campaign time violations, and black campaign. This study implemented a secure SMS application for election fraud complaints as a tool for the society to report all forms of election fraud that have occurred to the election supervisory department safely. The RSA algorithm was applied to encrypt the messages for sender privacy protection. The application was able to perform the message randomization function properly with a 10.44% avalanche effect. Brute force attack using a 16-bit key length needs 3.7 milliseconds for each try to find 32.768 possible private keys.
2022, Lecture Notes in Computer Science
In this paper, we introduce a novel electronic voting protocol which is resistant to more powerful corrupted parties and coercers than any previous works. They can be the voting authorities inside the system who can steal voters'... more
In this paper, we introduce a novel electronic voting protocol which is resistant to more powerful corrupted parties and coercers than any previous works. They can be the voting authorities inside the system who can steal voters' information and the content of their votes, or the adversaries outside who try to buy the votes, and force voters to follow their wishes. The worst case is that the adversaries outside collude with all voting authorities inside to destroy the whole system. In previous works, authors suggested many complicated cryptographic techniques for fulfilling all security requirements of electronic voting protocol. However, they cannot avoid the sophisticated inside and outside collusion. Our proposal prevents these threats from happening by the combination of blind signature, dynamic ballots and other techniques. Moreover, the improvement of blind signature scheme together with the elimination of physical assumptions makes the newly proposed protocol faster and more efficient. These enhancements make some progress towards practical security solution for electronic voting system.
2022
Nigeria is known with tedious activities and time consuming. There is a serious problem in terms of delivering the electoral facilities to the voting station and securing such facilities. even before this activities there must be training... more
Nigeria is known with tedious activities and time consuming. There is a serious problem in terms of delivering the electoral facilities to the voting station and securing such facilities. even before this activities there must be training of personal that will be involve in such exercise with involve huge amount of money and time consuming. it is in line with this problem the researcher intend to develop an online electronic voting systems to checkmate those problems. Each voter will be screen for eligibility, thereafter the information will be store in database so that at any time the voter can login and cast his/her vote and monitor the result online. Whenever a voter cast a vote the systems will automatically saves all his records including the ballot, username, address and password for future references. an administrator will then be able to monitor all the process and check for any illegal actions. This systems if put into use will increase transparency an accountability as the observer can monitor all the activities during the registration/poling exercise.
2022, WSEAS Transactions …
Recently, there has been an increasing interest to improve the efficiency in election processes which has brought as a consequence a wide range of proposals for electronic voting. Electronic voting protocols are a reasonable alternative... more
Recently, there has been an increasing interest to improve the efficiency in election processes which has brought as a consequence a wide range of proposals for electronic voting. Electronic voting protocols are a reasonable alternative to conventional elections. Nevertheless, they are facing an evolution due to its requirements, especially the ones needed to provide full security considered to represent a democratic electronic vote. In the literature, different protocols based on public key schemes have been proposed to meet such security requirements. In this paper, we propose the use of bilinear pairings in order to provide the security requirements that an electronic voting protocol must meet, without requiring the entire infrastructure needed in a public key scheme. Proposed protocol considers two cryptographic primitives as main building blocks: threshold and blind signature schemes. It is divided in four main stages: setup , authentication, voting and counting. Moreover, it meets privacy, accuracy and robustness by using bilinear pairings. We make a comparative analysis, which is based on its performance and the key pairs, Trust and Certification Authorities it requires.
2022, Computer Technology and Application
E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer... more
E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer technologies and advances in cryptographic techniques, E-voting is now an applicable alternative for many non-governmental elections. However, security demands are paramount to electoral process in political arena. It was revealed that researchers show little interest in robustness of E-voting system compared to other E-voting requirements [1]. This paper shows that RSA (Ron Rivest, Adi Shamir and Leonard Adleman) cryptography algorithm can be incorporated into E-voting process as a whole. The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes. The performance of the cryptography algorithm is tested on a university E-voting system over a public network. The E-voting process is initiated by a server system that other computer nodes are connected to. The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number. The system performs consistently and reliably which in return gives good level of confidence of votes count.
2022
This paper presents a hybrid e-voting system, in which a transparent e-voting protocol is embedded in a traditional paper-based voting procedure. To guarantee vote anonymity, the protocol itself is based on a scalable blind signature... more
This paper presents a hybrid e-voting system, in which a transparent e-voting protocol is embedded in a traditional paper-based voting procedure. To guarantee vote anonymity, the protocol itself is based on a scalable blind signature scheme with multiple authorities. An anonymous channel is used to cast the encrypted votes onto the public board. To prevent vote buying and vote coercion, we depart from the mainstream approach of taking additional measures to guarantee receipt-freeness. Instead, we propose to exploit the existence of a receipt to allow vote revocations over the enclosing paper-based voting procedure.
2022, 2018 3rd International Conference on Computer Science and Information Engineering (ICCSIE 2018)
It was considered that the security of information is an important factor in an electoral process in a country; for the frequent problems that have been detected in the scanning of votes to expedite the count. The objective is to analyze... more
It was considered that the security of information is an important factor in an electoral process in a country; for the frequent problems that have been detected in the scanning of votes to expedite the count. The objective is to analyze a method of vote scanning that allows improving security, administration, and implementation so that vote counting is faster and more secure compared to the traditional voting system. The deductive method and the exploratory investigation were used to analyze the information of the articles of the reference. It turned out to be a prototype of a voting scan algorithm based on the OCR reader scanner that was proposed and analyzed; for the scanning of the votes and projection of results via the Internet for the next elections is to improve the integrity of the information. It was concluded that a prototype of an adequate algorithm for vote scanning is an alternative to improve a traditional system that will be integrated into a voting system.
2022
2022, Government Information Quarterly
To date, most of our knowledge regarding individuals' propensity to internet vote comes from cross-sectional survey data. In this paper we try to break new ground by tracking individuals' actual behaviour over time. Specifically, we... more
To date, most of our knowledge regarding individuals' propensity to internet vote comes from cross-sectional survey data. In this paper we try to break new ground by tracking individuals' actual behaviour over time. Specifically, we analyze citizens' choice of voting channel by exploiting a unique longitudinal dataset -the Canton of Geneva's vote registry database. Our aim is to explore patterns in the propensity to use internet voting among eligible voters. To this end, we first mine the registry data to identify a subset of voters that have experimented with internet voting. In a second stage, we explore the effects of key socio-demographic variables on individual voters' fidelity to internet voting. Our results are counter-intuitive. While the conventional wisdom is that younger voters are most likely to be mobilised to use the internet voting channel, we show that this is not the case in one of the few political systems where internet voting is readily available. Indeed, our evidence suggests that it is the older voters rather than 'digital natives' (i.e., the younger voters) that are most likely to remain faithful to internet voting once they have experimented with it.
2022, Journal of Biometrics & Biostatistics
Biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. More importantly template security is of vital importance in the biometric systems because unlike passwords, stolen... more
Biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. More importantly template security is of vital importance in the biometric systems because unlike passwords, stolen biometric templates cannot be revoked. In this paper we describe the various threats that can be encountered by a biometric system. We specifically focus on attacks designed to elicit information about the original biometric data of an individual from the stored template. A few algorithms presented in the literature are discussed in this regard. We also examine techniques that can be used to deter or detect these attacks. Furthermore, we provide experimental results pertaining to a biometric system combining biometrics with cryptography, that converts dorsal hand vein templates into novel cryptographic structure called fuzzy vault. Initially, the pre-processing steps are applied to dorsal hand vein images for enhancement, smoothing and compression. Subsequently, thinning and binary encoding techniques are employed and then feature extracted. Then the biometric template and the input key are used to generate the fuzzy vault. For decoding, biometric template from dorsal hand vein image is constructed and it is combined with the stored fuzzy vault to generate the final key. The experimentation was conducted using dorsal hand vein databases and the FNMR and FMR values are calculated with and without noise. Journa l o f B io m etrics & B io s ta tistics
2022, International Journal of Computer Trends and Technology
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers have undergone... more
To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers have undergone many methodologies and techniques to secure software development life-cycle. A critical review for the development of secure software, Security and its usability is integrated at requirement specification process.
2022
Abstract: As the utilization of various e-voting technologies has notably increased in the past few years, so has the amount of publications on experiences with these technologies. This article will, therefore, map the literature while... more
Abstract: As the utilization of various e-voting technologies has notably increased in the past few years, so has the amount of publications on experiences with these technologies. This article will, therefore, map the literature while highlighting some of the important topics discussed within the field of e-voting. Particular attention will be paid to the non-technical dimensions of implementation, including the socio-cultural, organizational, and political dimensions. 1
2022
Voting process is important in any part of the world in public elections, private or autonomous bodies for electing someone. Due to the current pandemic situation, it is difficult to organize elections physically in the near future.... more
Voting process is important in any part of the world in public elections, private or autonomous bodies for electing someone. Due to the current pandemic situation, it is difficult to organize elections physically in the near future. Electronic voting (E-voting) is an alternative for organizing voting online through which a voter can cast his vote remote from any corner of the world through PC or mobile. Electronic voting is a challenging task to ensure voting requirements like eligibility, Accuracy, Simplicity, robustness, privacy, and reliability of the user and the system. In Electronic voting to enable remote voting, all the election data and its application modules are supposed to be stored at Cloud infrastructure. With the increase in usage of cloud computing services, data security and integrity is a major concern among various organizations. To ensure privacy, encryption techniques are widely being used in research. The purpose of the research here is to ensure security and reliability using CryptDB in Electronic voting process. In the proposed online Electronic voting system, voters data, Candidates data, votes triggered by voters are stored in encrypted database called CryptDB. CryptDB is already proven as a secure database which encrypts the data before storing them on the database and it follows multiple levels of encryption. The proposed systems does not reveal any information to the intruders at any level of polling system and hence the outcome of Voting process can be achieved using online system with Security, Confidentiality and integrity. With the help of CryptDB our system protects the information like the result of votes from the malicious administrator who tries to influence the voters in the voting process.
2022
Paper, pens, and ballot-boxes, appropriate procedures were used in traditional voting schemes to reassure voters that the result of the tally is correct [1]. Most viable approach to address voter coercion and vote selling in Internet... more
Paper, pens, and ballot-boxes, appropriate procedures were used in traditional voting schemes to reassure voters that the result of the tally is correct [1]. Most viable approach to address voter coercion and vote selling in Internet voting is still the basic concept [4]. Its unrealistic computational requirements of the quadratic-time tallying procedure.is one of the main open issues [4]. In this paper, they examine authorization of votes which is the main cause of the issue and the most recent proposals to perform this step in linear time will be summarized. Based on anonymity sets we explain the key underlying concepts of these proposals and introduce a new protocol. However at the negative side, high transparency will generally make it easier for voters to reveal how they voted [1]. Relevant information is published so that the voter may verify that her vote is included in the final tally and that accepted votes have been cast using proper voting material. With the purpose of in...
2022, International Journal of Computer Applications
Paper, pens, and ballot-boxes, appropriate procedures were used in traditional voting schemes to reassure voters that the result of the tally is correct [1]. Most viable approach to address voter coercion and vote selling in Internet... more
Paper, pens, and ballot-boxes, appropriate procedures were used in traditional voting schemes to reassure voters that the result of the tally is correct [1]. Most viable approach to address voter coercion and vote selling in Internet voting is still the basic concept [4]. Its unrealistic computational requirements of the quadratic-time tallying procedure.is one of the main open issues [4]. In this paper, they examine authorization of votes which is the main cause of the issue and the most recent proposals to perform this step in linear time will be summarized. Based on anonymity sets we explain the key underlying concepts of these proposals and introduce a new protocol. However at the negative side, high transparency will generally make it easier for voters to reveal how they voted [1]. Relevant information is published so that the voter may verify that her vote is included in the final tally and that accepted votes have been cast using proper voting material. With the purpose of internet voting protocol it is practically impossible for vote buyers or coercers to elicit the voters' behavior. The efficiency is compared efficiency with existing work under equal degrees of coercion-resistance using an appropriate measure. Internet voting enjoys wide interest from both researches as well as practices [2]. The main purpose of the new protocol is to move computational complexity introduced in recent works from the voter side to the tallying authority side.
2022
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper. The proposed system has four components: face preprocessing, feature extraction,... more
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper. The proposed system has four components: face preprocessing, feature extraction, cancelable feature extraction followed by the classification, and encryption/decryption of cancelable face feature templates. During face preprocessing, the facial region of interest has been extracted out to speed the process for evaluating discriminant features. In feature extraction, some optimization techniques such as Sparse Representation Coding, Coordinate descent, and Block coordinates descent have been employed on facial descriptors to obtain the best representative of those descriptors. The representative descriptors are further arranged in a spatial pyramid matching structure to extract more discriminant and distinctive feature vectors. To preserve them, the existing BioHashing technique has been modified and extended to some higher levels of...
2022, 2018 3rd International Conference on Computer Science and Information Engineering (ICCSIE 2018)
It was considered that the security of information is an important factor in an electoral process in a country; for the frequent problems that have been detected in the scanning of votes to expedite the count. The objective is to analyze... more
It was considered that the security of information is an important factor in an electoral process in a country; for the frequent problems that have been detected in the scanning of votes to expedite the count. The objective is to analyze a method of vote scanning that allows improving security, administration, and implementation so that vote counting is faster and more secure compared to the traditional voting system. The deductive method and the exploratory investigation were used to analyze the information of the articles of the reference. It turned out to be a prototype of a voting scan algorithm based on the OCR reader scanner that was proposed and analyzed; for the scanning of the votes and projection of results via the Internet for the next elections is to improve the integrity of the information. It was concluded that a prototype of an adequate algorithm for vote scanning is an alternative to improve a traditional system that will be integrated into a voting system.
2022, IEEE Access
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper. The proposed system has four components: face preprocessing, feature extraction,... more
A novel cancelable FaceHashing technique based on non-invertible transformation with encryption and decryption template has been proposed in this paper. The proposed system has four components: face preprocessing, feature extraction, cancelable feature extraction followed by the classification, and encryption/decryption of cancelable face feature templates. During face preprocessing, the facial region of interest has been extracted out to speed the process for evaluating discriminant features. In feature extraction, some optimization techniques such as Sparse Representation Coding, Coordinate descent, and Block coordinates descent have been employed on facial descriptors to obtain the best representative of those descriptors. The representative descriptors are further arranged in a spatial pyramid matching structure to extract more discriminant and distinctive feature vectors. To preserve them, the existing BioHashing technique has been modified and extended to some higher levels of security attacks and the modified BioHashing technique computes a cancelable feature vector by the combined effect of the facial feature vector and the assigned token correspond to each user. The elements of computed cancelable feature vector are in a numeric form that has been employed to perform both verifications as well as identification task in online while the original facial feature vectors are kept offline either in hard drive or disc. Then, to enhance more security levels and also to preserve the cancelable face features, an RSA based encryption-decryption algorithm has been introduced. The proposed system has been tested using four benchmark face databases: CASIA-FACE-v5, IITK, CVL, and FERET, and performance are obtained as correct recognition rate and equal error rate. The performance are compared to the state-of-the-art methods for the superiority of the proposed feature extraction technique and individual performance analysis has been performed at all the security levels of the proposed Cancelable FaceHashing Technique. These comparisons show the superiority of the proposed system.
2022, SN Computer Science
Voting process is important in any part of the world in public elections, private or autonomous bodies for electing someone. Due to the current pandemic situation, it is difficult to organize elections physically in the near future.... more
Voting process is important in any part of the world in public elections, private or autonomous bodies for electing someone. Due to the current pandemic situation, it is difficult to organize elections physically in the near future. Electronic voting (E-voting) is an alternative for organizing voting online through which a voter can cast his vote remote from any corner of the world through PC or mobile. Electronic voting is a challenging task to ensure voting requirements like eligibility, Accuracy, Simplicity, robustness, privacy, and reliability of the user and the system. In Electronic voting to enable remote voting, all the election data and its application modules are supposed to be stored at Cloud infrastructure. With the increase in usage of cloud computing services, data security and integrity is a major concern among various organizations. To ensure privacy, encryption techniques are widely being used in research. The purpose of the research here is to ensure security and reliability using CryptDB in Electronic voting process. In the proposed online Electronic voting system, voters data, Candidates data, votes triggered by voters are stored in encrypted database called CryptDB. CryptDB is already proven as a secure database which encrypts the data before storing them on the database and it follows multiple levels of encryption. The proposed systems does not reveal any information to the intruders at any level of polling system and hence the outcome of Voting process can be achieved using online system with Security, Confidentiality and integrity. With the help of CryptDB our system protects the information like the result of votes from the malicious administrator who tries to influence the voters in the voting process.
2022, Int. J. Netw. Secur.
This paper proposes a new electronic voting (e-voting) scheme that exploits 2 pairs of signatures of signing (election) authorities. One pair of signatures on each voter’s same blinded token enables the voter to appear to authorities in... more
This paper proposes a new electronic voting (e-voting) scheme that exploits 2 pairs of signatures of signing (election) authorities. One pair of signatures on each voter’s same blinded token enables the voter to appear to authorities in consecutive election stages anonymously. Another pair of signatures on each voter’s same blinded vote enables authorities to protect them from the voter’s dishonesties. Namely, while a vote remains same within its 2 different signed forms, the voter cannot claim that her vote is disrupted by other entities while intentionally submitting a meaningless or invalid vote. The scheme is suitable for small community where the number of voters is not very high. Here for vote construction, Hwang et al.’s untraceable blind signature (BS) scheme is exploited. Thereby no mutually independent signing authority involved in the scheme is able to link the resulting vote-signature pair even when the signature is publicly revealed. When compared with existing schemes,...