An Application of time stamped proxy blind signature in e-voting

Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 6

Abstract

Voting is a way for a voter to make a decision or express an opinion or to choose a candidate. E-voting (Electronic Voting) refers to both the electronic means of casting a vote and the electronic means of counting and publishing that votes. The E - voting system has some specific advantages as compared to the traditional voting system. In this paper, a secure and efficient e-voting protocol is proposed which is based on the time stamped proxy blind signature.

Authors and Affiliations

Suryakanta Panda , Santosh Kumar Sahu , Jagannath Mohapatra , Ramesh Kumar Mohapatra

Keywords

Related Articles

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS

Cloud computing is an emerging technology that access emote servers through Internet to maintain data and pplications. It incorporates the advantages of grid and utility omputing. This paper expresses the mportance o...

Secure Web Service Using Call by Contract

A methodology for designing and composing services in a ecure manner. In particular, it’s concerned with safety roperties of service behavior. Services can enforce security olicies locally and can invoke other service...

Audio Compression Codec Using a Dynamic Gammachirp Psychoacoustic Model And a D.W.T Multiresolution Analysis

Audio compression algorithms are used to obtain compact digital representations of high-fidelity audio signals for the purpose of efficient transmission over larger distances and storage. This paper presents an audio cod...

A New Method to Improve the Simulation Of Piezoelectric Transducer Using PSPICE And Genetic Algorithms

Piezoelectric transducer (SAW devices) is a very important device in industry but it is very difficult to simulate it using any circuit-simulation program. This paper proposes a practical method to simulate the Mason’s m...

Security of Data Fragmentation and Replication over Un-trusted Hosts Arun Kumar Yadav, Dr. Ajay Agarwal

Data replication technique is used to avoid the fault tolerance and improve the performance .With this initiation of content delivery networks, it is becoming more and more frequent that data content is placed on hosts t...

Download PDF file
  • EP ID EP114927
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Suryakanta Panda, Santosh Kumar Sahu, Jagannath Mohapatra, Ramesh Kumar Mohapatra (2013). An Application of time stamped proxy blind signature in e-voting. International Journal on Computer Science and Engineering, 5(6), 547-552. https://europub.co.uk/articles/-A-114927