2022
DOI: 10.3991/ijim.v16i20.33173
|View full text |Cite
|
Sign up to set email alerts
|

Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption

Abstract: Improving the voting system has become a widely discussed issue. Paper-based elections are not safe because of the possibility of changing and adding ballots. Consequently, many countries use e-voting systems to ensure security, authenticity and time efficiency. Blockchain e-voting systems can be adopted to reduce fraud and increase voting access from home, especially in pandemics. This paper suggests a blockchain e-voting system that tackles two security and authentication issues. The security has been ensure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 18 publications
(32 reference statements)
0
1
0
Order By: Relevance
“…However, complex implementation, cost, and data overload may pose challenges. Organizations should weigh the benefits and drawbacks before implementing a business intelligence system for cyber security [44].…”
Section: B Discussionmentioning
confidence: 99%
“…However, complex implementation, cost, and data overload may pose challenges. Organizations should weigh the benefits and drawbacks before implementing a business intelligence system for cyber security [44].…”
Section: B Discussionmentioning
confidence: 99%
“…Homomorphic Encryption (HE) is essential for enabling private inference. HE is a cryptographic technique that enables computations to be executed on encrypted data, producing an encrypted output corresponding to the result of operations performed on unencrypted data [11], [12]. This attribute facilitates the execution of computations on encrypted data by multiple entities without necessitating access to the unprocessed, unencrypted data.…”
Section: Legal Obligationsmentioning
confidence: 99%
“…Those "parts" may be corner and spatiotemporal interest point trajectories or flow vectors. Even though part-based techniques are promising [11], they still struggle with erroneous background clutter and motion-induced background detection and tracking of important sections, which precludes a clear and useful representation [12].…”
Section: Related Workmentioning
confidence: 99%