2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T) 2022
DOI: 10.1109/icpc2t53885.2022.9776966
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Implementing this procedure, coupled with Blockchain technology, hold the potential to bring about a profound transformation in the present voting scheme. It not only ensures obscurity and secrecy but also addresses the critical issue of vote consistency, thus contributing to the reliability and safety of democratic elections [51,58].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Implementing this procedure, coupled with Blockchain technology, hold the potential to bring about a profound transformation in the present voting scheme. It not only ensures obscurity and secrecy but also addresses the critical issue of vote consistency, thus contributing to the reliability and safety of democratic elections [51,58].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, classical public key cryptographic techniques and hash functions belong to the pre-quantum computing era, and their security is challengeable in the post-quantum computing era. Post-quantum cryptography (PQC) involves efficient cryptographic techniques that are resistant to attacks from quantum computing; thus, efficient and lightweight PQC is desirable for blockchains to minimize quantum computing-based attacks [85]. Being descendants of the family of elliptic curve cryptography, Montgomery curve (Curve448) and Edwards curve (Ed448) cryptographic techniques are deployed in digital signatures and key agreement, which can be efficiently implemented in Cortex-M4 with performance improvements and, thus, can be deployed in hybrid systems that use a mixture of classical and post-quantum cryptographic techniques [86].…”
Section: Blockchain Cryptographymentioning
confidence: 99%
“…Te proposed mathematical procedure aims at materializing the efciency of the selected features for phish detection. Te features used by Phish Block have been selected based on the ability to integrate with blockchain [28]. Te rate of error detection can be found from the system's phish block and logical parameters.…”
Section: Proposed Phish Blockmentioning
confidence: 99%