An Implementation of Online Voting System using Okamoto-Uchiyama Encryption Scheme
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 2
Abstract
Electronic voting (e-Voting) has totally replaced the traditional voting system. Due to the rapid growth of computer networks and cloud computing the existing e-Voting system can be replaced with online voting system.When data is on cloud,the major challenge in voting system is confidentiality, security and accuracy. The advances in cryptography can be used to a face these challenges. The presented work implements Okamoto-Uchiyama algorithm with its additive homomorphic property. This work focuses on serving voting system on large scale of voters. We have made our system more user friendly and faster but secured than existing systems.
Authors and Affiliations
Sneha N. Patil, Vidyullata Devmane
Identification of Cardiac Diseases from(ECG) Signals based on Fractal Analysis
This paper investigates the use of fractal geometry for analyzing ECG time series signals. A technique of identifying cardiac diseases is proposed which is based on estimation of Fractal Dimension (FD) of ECG recordings....
Efficient Detection of SPAM messages and SPAM zombies in the Internet using Naïve-Bayesian and Sequential Probability Ratio Test (SPRT)
The Internet is a global system of interconnected computer networks that provides the communication to serve billions of users worldwide. Compromised machines in the internet allows the attackers to launch various securi...
EVALUTION AND CALIBRATION OF MINIATURE CIRCUIT BREAKER
The purpose of this paper is to examine the significant developments in MV and LV switchgear technology over the last few decades and why they are only recently beginning to benefit the users. A recent development now ha...
Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP
Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determ...
Implementation of the Basic System in the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol use...