Secure E-voting System by Utilizing Homomorphic Properties of the Encryption Algorithm
Cryptography technique is used to encrypt the information such as voter's data, voter's choice, and the voting result before that data stored on the server. [...]the system can ensure authenticity and security of voting information [1]. To achieve that, there are several numbers that need...
Gespeichert in:
Veröffentlicht in: | Telkomnika 2018-04, Vol.16 (2), p.862-867 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Cryptography technique is used to encrypt the information such as voter's data, voter's choice, and the voting result before that data stored on the server. [...]the system can ensure authenticity and security of voting information [1]. To achieve that, there are several numbers that need to be generated before with following procedure. 2.1.Key Generation In the Paillier algorithm, to generate the private key and public key, we need to select two different big prime numbers p and q with ged (pą,(p-1)(ą-1)=1. The function of random number r in both algorithms is to make the result of encryption message that has exactly same value will different result of ciphertext. [...]these algorithms can guarantee the uniqueness of the data to be stored. [5] Rifki S, Surya M N, Fairuz A. Okamoto-Uchiyama Homomorphic Encryption Algorithm Implementation in E-Voting System. |
---|---|
ISSN: | 1693-6930 2302-9293 |
DOI: | 10.12928/TELKOMNIKA.V16İ2.8420 |