Professional Documents
Culture Documents
additive homomorphic encryption to be used in the TinyPEDS Each authority has a protected directory to store his public and
framework in WSN. The main optimization techniques private key. No authority is accessible to another authority’s
employed are pseudo-Mersenne prime reduction on the finite directory.
field level and the Interleave method and the signed MOF
representation for the point multiplication. The paper [5] 2) Voter Authentication and Authorization:
discusses the recording of voting result using Blockchain The voter who wants to participate in the election, must
algorithm from every place of election. By adopting enroll them-selves by submitting their Voter ID and other ID
Blockchain in the distribution of databases on e-voting proofs like Aadhaar card, etc., Once the Voter ID is verified, a
systems can reduce one of the cheating sources of database unique reference key is generated and sent to the voter which
manipulation. The use of hash values makes this system more can be used to login into the voting system at the time of
secure and the use of digital signature more reliable. election.
use small prime number. Hence, reducing the overhead of the with ECC which is more secured compared to other
computation. The voter needs to generate signature for the cryptography and is also relatively less computation. In this
vote castes which will be verified by the authority to ensure paper the additive homomorphic property of ECC is used for
that the vote has been from authorized voter. While verifying computation of results and Blockchain for storing the
the signature the authority cannot decrypt the vote of encrypted ballots.
particular voter. He can only verify whether the vote has been
casted by authorized voter or not. The algorithm for V. REFERENCES
encryption of vote is given. [1] X. Yang, X. Yi, S. Nepal, A. Kelarev and F. Han, "A
Secure Verifiable Ranked Choice Online Voting System
Based on Homomorphic Encryption," in IEEE Access, vol.
6, pp. 20506-20519, 2018.
Algorithm 2 Encryption of Vote Mi by Voter Vi
[2] K. El Makkaoui, A. Beni-Hssane and A. Ezzati, "Cloud-
Input: Generator (G), Voter’s Secret Key (R), CPK, Vote M ElGamal: An efficient homomorphic encryption
Output: C1,C2 (cipher texts) scheme," 2016 International Conference on Wireless
Initialization; Networks and Mobile Communications (WINCOM), Fez,
1) Compute C1 = ECC.MUL(G,R) 2016, pp. 63-66.
2) Compute T = ECC.MUL(CPK,R) [3] A. Ara, M. Al-Rodhaan, Y. Tian and A. Al-Dhelaan, "A
3) Compute C2 = ECC.ADD(M,T) Secure Privacy-Preserving Data Aggregation Scheme Based
4) Return C1,C2 on Bilinear ElGamal Cryptosystem for Remote Health
Monitoring Systems," in IEEE Access, vol. 5, pp. 12601-
12617, 2017.
[4] R. Hanifatunnisa and B. Rahardjo, "Blockchain based e-
5) Vote Authentication using DSA voting recording system design," 2017 11th International
The signatures sent by the voters while casting the votes are Conference on Telecommunication Systems Services and
verified by a random authority. He verifies whether the vote is Applications (TSSA), Lombok, 2017, pp. 1-6.
casted by authorized voter or not. If the verification is found to [5] Fu Minfeng and Chen Wei, "Elliptic curve cryptosystem
be false then the vote is assumed to be a false vote and it is ElGamal encryption and transmission scheme," 2010
ignored. If the vote is verified to be true then the vote is International Conference on Computer Application and
accounted for tallying purpose. The authority also verifies System Modeling (ICCASM 2010), Taiyuan, 2010, pp. V6-
whether he particular voter has casted only one vote. If 51-V6-53.
multiple votes are detected then the vote is ignored.
1. Compute W = INVERSE(S2,N)
2. Compute V1 = H * W (mod N)
3. Compute V2 = S1 *W (mod N)
4. Compute T1 = ECC.MUL(G,V1)
5. Compute T2 = ECC.MUL(Y,V2)
6. Compute V = ECC.ADD(T1,T2)
7. IF V(mod N) == S1 THEN return
8. ELSE return false