How to secure network application systems using cryptographic protocols - Electronic voting systems case

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, we present cryptographic techniques for ensuring security properties required in electronic voting. In electronic voting, it is important to exclude faulty votes while ensuring the privacy of honest voters. We employ the idea of double-envelopes used in paper-based voting system, and employ cryptographic techniques to realize the same effect in the digital world. We also implemented the idea in a demonstrative system, and have shown that it only takes 20 minutes to process 10,000 votes using 1GHz personal computers.

Original languageEnglish
Pages (from-to)191-194
Number of pages4
JournalNEC Research and Development
Volume43
Issue number3
Publication statusPublished - 2002 Jul
Externally publishedYes

Keywords

  • Cryptography
  • Election
  • Encryption
  • Voting
  • Zero-knowledge proof

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'How to secure network application systems using cryptographic protocols - Electronic voting systems case'. Together they form a unique fingerprint.

Cite this