2019 12th CMI Conference on Cybersecurity and Privacy (CMI) 2019
DOI: 10.1109/cmi48017.2019.8962142
|View full text |Cite
|
Sign up to set email alerts
|

Electronic Voting Recording System Based on Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…15 Agbesi and Asante describe a blockchain-based voting system to support elections in Africa. 16 Vijayalakshmi and Vimal explore how to maintain voter secrecy in keeping blockchain data encrypted. 17 It is necessary to closely monitor the behavior of the voting processes in order to detect signs of tampering or malfunction.…”
Section: Enhancing the Electronic Voting Processmentioning
confidence: 99%
“…15 Agbesi and Asante describe a blockchain-based voting system to support elections in Africa. 16 Vijayalakshmi and Vimal explore how to maintain voter secrecy in keeping blockchain data encrypted. 17 It is necessary to closely monitor the behavior of the voting processes in order to detect signs of tampering or malfunction.…”
Section: Enhancing the Electronic Voting Processmentioning
confidence: 99%
“…As a result, the uniqueness of the Nash equilibrium arrival rate p e of transactions is difficult to be proved strictly. For this, we carry out analysis experiments based on (14) and (15) to continue investigate the Nash equilibrium behavior and socially optimal behavior of transactions.…”
Section: A Nash Equilibrium Behavior and Socially Optimal Behaviormentioning
confidence: 99%
“…Blockchain technology has been applied in the fields of managing medical information [4]- [6], cloud computing [7]- [9], Internet of Things (IoT) [10]- [12], smart voting [13]- [15] and security services [16]- [18]. Considering the third-party's security of cross-domain image sharing, Patel, V. developed a distributed data store framework based on blockchain technology [4].…”
Section: Introductionmentioning
confidence: 99%
“…The new cryptographic cipher will be the basis for the current study, it is based precisely on the presence of only two keys, which are public and private [19], [20]. Nevertheless, it is worth to mention that regarding this encryption method is also used in order to decrypt information, meaning that one requires the other, i.e.…”
Section: Phase III -Encrypted Votingmentioning
confidence: 99%
“…All this data will be necessary to enter the integral system of electronic voting, this avoids the impersonation of the voter [31]and then leading to the next screen. Likewise, in the screen shown in Figure 13, the security and integrity of the data of the electronic voting process is a system that must be transparent and reliable, as well as safeguard the identity of the voters [9].The challenge at this step is the need to achieve the anonymity of the citizens, in other words, to eliminate the identity of the voter [19]. As a basic function of this solution, Blockchain technology has been identified as sufficiently addressing all these challenges [34].…”
Section: Case Studymentioning
confidence: 99%