2015 11th International Conference on Information Assurance and Security (IAS) 2015
DOI: 10.1109/isias.2015.7492759
|View full text |Cite
|
Sign up to set email alerts
|

An electronic voting system based on homomorphic encryption and prime numbers

Abstract: In this paper we present an electronic voting system based on homomorphic encryption to ensure privacy, confidentiality in the voting. Our proposal offers all the advantages of the multiplicatively homomorphic encryption cryptosystems. The proposed voting scheme is suitable for multicandidate elections as well as for elections in which contains neutral votes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…In contrast to gain agreement for the high-frequency element of the image, which is the basic principle behind “adaptive contrast enhancement (ACE),” it consists of limitation in terms of high processing time ( 32 – 38 ). In MBD classification, local details are more important than global features and reduce processing time; the proposed architecture uses the contrast limited adaptive histogram equalization (CLAHE) algorithm for limited contrast enrichment of fibroglandular tissues ( 39 41 ).…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In contrast to gain agreement for the high-frequency element of the image, which is the basic principle behind “adaptive contrast enhancement (ACE),” it consists of limitation in terms of high processing time ( 32 – 38 ). In MBD classification, local details are more important than global features and reduce processing time; the proposed architecture uses the contrast limited adaptive histogram equalization (CLAHE) algorithm for limited contrast enrichment of fibroglandular tissues ( 39 41 ).…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The large passenger flow and complex environmental characteristics of urban rail transit also affect the application of face recognition technology in urban rail transit. In this regard, the application of a face recognition system in urban rail transit should also pay attention to the following aspects: the uncertainty in the process of video image acquisition [26][27][28][29]. Due to the complex environment of urban rail transit, such as lighting, installation location, occlusion, and human posture, the acquired video and image quality are different, and the face acquisition is unclear or lacking [30][31][32], which affects the recognition rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…We present the running time of Koinonia Library in Table 1 and show that the computation cost of our implementation is small, and the system can be deployed on commodity machine 4 . In terms of storage cost, for an election with one position (e.g.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Most of these systems focus primarily on integrity and have not considered long-term privacy as their main concerns. E-voting protocols typically utilize the following cryptographic techniques: mix-net [1,3,14,16,18,19,22,29,41,45,56,57,63,66], homomorphic encryption [2,4,25,27,28,40,43,47], blind signature [12,17,44,51,54] and secret sharing based on polynomials [6,7,27,59] or simple (n, n) secret sharing [68]. Despite numerous previous work on everlasting voting privacy [10,11,27,32,33,[46][47][48][49][50]64], we note that the adversary models under which these schemes can achieve privacy could be different.…”
Section: Related Workmentioning
confidence: 99%