Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

E-Voting using Homomorphic Encryption Scheme

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Tannishk Sharma
10.5120/ijca2016909652

Tannishk Sharma. E-Voting using Homomorphic Encryption Scheme. International Journal of Computer Applications 141(13):14-16, May 2016. BibTeX

@article{10.5120/ijca2016909652,
	author = {Tannishk Sharma},
	title = {E-Voting using Homomorphic Encryption Scheme},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {141},
	number = {13},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {14-16},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume141/number13/24843-2016909652},
	doi = {10.5120/ijca2016909652},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

A manual voting system can be time consuming and cumbersome and takes a lot of time. With the rapid development of Information Technology an E voting system tends to overcome all these limitations. E voting is fast and helps us to cast our vote from any location. One of the main concern of then E-Voting System is security. In this paper we propose an E-Voting System using Paillier Homomorphic Encryption Scheme which is used to provide security to the voting system and in turn help us to manipulate and transfer data in encrypted form making it impenetrable. Here We use the Paillier Encryption Homomorphic property that allows us to add the votes in encrypted form. The online voting is more reliable than the traditional system and is able to save to save the time

References

  1. Caroline Fontaine and Fabien Galand , A Survey of Homomorphic Encryption for No specialists , EURAISP Journal of Information Security
  2. Craig Gentry , A Fully Homomorphic Encryption Scheme
  3. Michael O’Keeffe , The Paillier Cryptosystem
  4. Sansar Choinyambuu , Homomorphic Tallying with Paillier Cryptosystem
  5. Coung Ngo , Secure Voting System Using Homomorphic Encryption
  6. E-Voting Simulator based on the Paillier Cryptosystem, Andreas Steffen, HSR Hochschule für Technik Rapperswil
  7. Schneier , B(1996). Applied Cryptography: protocols , algorithms and source code in C/Brue Schneir , New York , c1996
  8. Paillier Cryptosystem , Wikipedia
  9. Lecture Notes 15 : Voting, Homomorphic Encryption Ron Rivest
  10. Xun Yi., and Eiji Okamoto, “Practical Remote End-to-End Voting Scheme”, EGOVIS 2011, LNCS 6866, pp. 386–400, 2011, Springer Verlag Berlin Heidelberg 2011
  11. Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI, “Homomorphic Encryption Applied to the Cloud Computing Security ” WCE 2012, July 4 - 6, 2012, London, U.K.
  12. N. P. Smart and F. Vercauteren. Fully homomorphic simd operations. IACR Cryptology ePrint Archive, 2011:133,2011.
  13. William Stalllings, Cryptography & Network Security, Fourth Edition, Pearson Education, 2006.
  14. Ryan, P. Y. A. (2007). The computer ate my vote. Retrieved from http://www.dagstuhl.de/Materials/Files/07/07091/07091.RyanPeter.Paper.pdf
  15. A. Acquisti, “Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots”, Technical Report 2004/105, CMU-ISRI-04- 116 (2004).

Keywords

Homomorphic encryption, Paillier Algorithm, E-voting, Cryptography