2024
DOI: 10.1109/ojcoms.2023.3348468
|View full text |Cite
|
Sign up to set email alerts
|

ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property

Suman Majumder,
Sangram Ray,
Dipanwita Sadhukhan
et al.

Abstract: Traditional voting systems mainly comprise of paper polling, electronic ballot system (EVM), mechanical devices, etc., and demand the physical presence of the voters. In the new age of digitization, the electronic voting system has come up with a unique facility to cast votes from any discreet place. However, the e-voting system has to face several challenges regarding security and privacy. To overcome such obstructions, blockchain is introduced in e-voting applications that preserve anonymity, security, and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…In 2015, the internet was primarily a platform for information and communication for Czechs 93% of internet users use it for email communication, half of people use social networks, and 2/3 consume news portals. Czechs also frequently use the internet to search for information about goods and services and to make purchases [22].…”
Section: Resultsmentioning
confidence: 99%
“…In 2015, the internet was primarily a platform for information and communication for Czechs 93% of internet users use it for email communication, half of people use social networks, and 2/3 consume news portals. Czechs also frequently use the internet to search for information about goods and services and to make purchases [22].…”
Section: Resultsmentioning
confidence: 99%
“…In this section, we analyze the session key security of the proposed protocol using the ROR model [9]. We utlize the security model in Section 3.5 and follow the security proof of [34][35][36] which proved the session key security using the ROR model. Theorem 1.…”
Section: Ror Modelmentioning
confidence: 99%