2008 International Conference on Computational Sciences and Its Applications 2008
DOI: 10.1109/iccsa.2008.42
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Cryptography Algorithms in Security of Voting System Approaches

Abstract: There are three general classes of cryptographic voting protocols: those based on blind signatures, those based on mix-nets, and using homomorphic encryption. Historically, cryptographic research has focused on proving that the tally is the sum of all the ballots, and that the contents of individual ballots remain secret. Cryptographic voting research considered the voter and the polling booth to be one entity. Voter's final ballot must be secret and she can not prove the contents of her final ballot to anyone… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 6 publications
(21 reference statements)
0
3
0
Order By: Relevance
“…Therefore, the final output is the shared value of all blocks. If the alteration of one bit anywhere in the text message, the overall hashed value will be changed, called the avalanche effect [40], [41].…”
Section: Sha Familymentioning
confidence: 99%
“…Therefore, the final output is the shared value of all blocks. If the alteration of one bit anywhere in the text message, the overall hashed value will be changed, called the avalanche effect [40], [41].…”
Section: Sha Familymentioning
confidence: 99%
“…The availability of verifiability properties gives the voters the confidence that the voting system used provides protection, both to the votes cast and to the identity of the voters themselves [8]. In e-voting systems, data security can be divided into two parts, namely: security related to the ballots (from the voting stage to the counting stage), and verification by voters to ensure that the content of their vote has not been changed and has been counted correctly [9].…”
Section: Introductionmentioning
confidence: 99%
“…A survey of the current legally binding electronic voting system can be found in [1], and a survey on cryptographic techniques used in e-voting can be found in [2]. There are also several research papers on increasing the reliability of the e-voting process by using verifiable voting receipts that doesn't break the privacy requirements of the election, such as [3], [4], [5].…”
Section: Introductionmentioning
confidence: 99%