Idea Transcript
IEEE.org | IEEE Xplore Digital Library | IEEE-SA | IEEE Spectrum | More Sites
Cart (0) | Create Account | Personal Sign In
Institutional Sign In
Browse
My Settings
Get Help
Subscribe
Advertisement
Browse Conferences > Network and System Security, ...
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography 6
Sign In or Purchase
3 Author(s)
Writing temporally predictable code FTS: a high-performance CORBA fault-tolerance service
687
Paper Citations
to View Full Text
Related Articles
Full Text Views
View All
Tohari Ahmad ; Jiankun Hu ; Song Han
Abstract
Authors
Figures
References
View All Authors
Citations
Keywords
Metrics
Media
Abstract: The wide-spread use of mobile devices has made it possible to develop mobile voting system as a complement to the existing electronic voting system. However, due to limited onboard resource, it is challenging to achieve both efficiency and security strength for mobile voting system. Conventional solution is to either use symmetric encryption algorithms or hybrid symmetric and asymmetric algorithms at the expense of weaker security strength. In our proposed mobile voting scheme, the users’ votes are secured by using the elliptic curve cryptography (ECC) algorithm. ECC is chosen as it has smaller key size than other public key cryptographies; and its homomorphic encryption property which is able to keep users’ anonymity. We evaluate the method of ECDH with AES and ECC in comparison with our proposed method. The experiment demonstrates that our proposed ECC based scheme can outperform the traditional hybrid symmetric and asymmetric cryptographic scheme in the context of mobile evoting environment. Published in: Network and System Security, 2009. NSS '09. Third International Conference on Date of Conference: 19-21 Oct. 2009
INSPEC Accession Number: 10974321
Date Added to IEEE Xplore: 10 November 2009
DOI: 10.1109/NSS.2009.57
ISBN Information:
Publisher: IEEE Conference Location: Gold Coast, QLD, Australia
Advertisement
Contents
Download Citation
I. INTRODUCTION For more than two decades, electronic voting (e-voting) has been investigated. Despite its argument for and against [1], it is implemented in the real environment, either in a small or large scale, such as in Estonian public election [2].
Email
Print
Request Permissions
Full Text Abstract
Read document
View References
Authors Keywords IEEE Keywords Elliptic curve cryptography, Public key cryptography, Electronic voting, Mobile computing, Information security, Electronic voting systems, Computer security, Nominations and elections, Computer science, Information technology INSPEC: Controlled Indexing public key cryptography, government data processing, mobile computing
Figures References Citations Keywords
Alerts
Back to Top INSPEC: Non-Controlled Indexing homomorphic encryption property, mobile voting system security scheme, elliptic curve cryptography, mobile device, electronic voting system, symmetric encryption algorithm, hybrid symmetric algorithm, asymmetric algorithm, public key cryptography Author Keywords security, mobile voting, cryptography, ECC
Authors Tohari Ahmad Sch. of Comput. Sci. & Inf. Technol., RMIT Univ., Melbourne, VIC, Australia Jiankun Hu Sch. of Comput. Sci. & Inf. Technol., RMIT Univ., Melbourne, VIC, Australia Song Han DEBI Inst., Curtin Univ. of Technol., Perth, WA, Australia
Related Articles Writing temporally predictable code P. Puschner; A. Burns FTS: a high-performance CORBA fault-tolerance service R. Friedman; E. Hadad Role-based access control for CORBA distributed object systems R.R. Obelheiro; J.S. Fraga A static timing analysis environment using Java architecture for safety critical real-time systems E.Y.-S. Hu; G. Bernat; A. Wellings Schedulability in model-based software development for distributed real-time systems S.S. Yau; Xiaoyong Zhou Configurable services for mobile users A. Rasche; A. Polze Compression of 3D objects with multistage color-depth panoramic maps Chang-Ming Tsai; Wen-Yan Chang; Chu-Song Chen; G.Y. Tang New techniques for bounding the channel capacity of read/write isolated memory Xuerong Yong; M.J. Golin Wavelet-based lossy compression of barotropic turbulence simulation data J.P. Wilson Assessing multi-version systems through fault injection P. Townend; Jie Xu
IEEE Account
Purchase Details
Profile Information
Need Help?
» Change Username/Password
» Payment Options
» Communications Preferences
» US & Canada: +1 800 678 4333
» Update Address
» Order History
» Profession and Education
» Worldwide: +1 732 981 0060
» View Purchased Documents
» Technical Interests
» Contact & Support
About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2017 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions. Loading [MathJax]/extensions/TeX/color_ieee.js