2021
DOI: 10.3390/electronics10243075
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme

Abstract: A number of e-voting systems have been proposed in the last decades, attracting the interest of the research community. The challenge is far from being fully addressed, especially for remote systems. In this work, we propose DiverSEC, a distributed, remote e-voting system based on Shamir secret sharing, operations in Galois field and mixnets, which enables end-to-end vote verification. Parties participate as nodes in the network, protecting their interests and ensuring process integrity due to the conflicting … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…E-voting, as a ways of refining the strength of electoral activities, depend on cryptographic techniques, predominantly blockchain cryptosystem, to defend the veracity of voter information. Within this perspective, the work illustrated the utilization of the Rivest, Shamir, Adleman (RSA) algorithm [37], a robust tool with flap technique that gets factoring huge prime numbers into their factor enormously tough. The RSA-Key Encapsulation Mechanism (RSA-KEM) was deployed as a protected voting strategy that processes with two layers: Symmetric and Public Key Layers and three essential tasks: key creation, encryption, and decryption.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…E-voting, as a ways of refining the strength of electoral activities, depend on cryptographic techniques, predominantly blockchain cryptosystem, to defend the veracity of voter information. Within this perspective, the work illustrated the utilization of the Rivest, Shamir, Adleman (RSA) algorithm [37], a robust tool with flap technique that gets factoring huge prime numbers into their factor enormously tough. The RSA-Key Encapsulation Mechanism (RSA-KEM) was deployed as a protected voting strategy that processes with two layers: Symmetric and Public Key Layers and three essential tasks: key creation, encryption, and decryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Overall, the overview of an e-voting mechanism [15,37] is undoubtedly accompanied by a multitude of challenges, spanning methodical, practical, and statutory domains. Among the most significant flaws of such mechanisms are the deficiency of transparency and clarity, prominent to diminished trust, the absence of universally recognized standards, the persistent threat of fraud and influence, and the enhanced financial burdens on voting setup.…”
Section: Introductionmentioning
confidence: 99%