Performance Evaluation of the Bingo Electronic Voting Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Research in e-voting aims at designing usable and secure electronic voting systems. This paperprovides an empirical analysis of the computational performance of a prototype implementation of the Bingoelectronic voting protocol. Bingo is a receipt-based end-to-end verifiable electronic voting protocol that claimsthe property of coercion resistance. According to this work, a prototype of the Bingo design has been describedin terms of sequence and class diagrams. Also, its operation has been demonstrated using a case study of asample election. Four main operations have been analyzed; initialization of cyclic groups, generation ofdummy votes, zero-knowledge proof of fair vote distribution over candidates, and zero-knowledge proof ofreceipt correctness. The performance was affected by the cyclic group order, number of candidates, and numberof voters.
Authors and Affiliations
Waleed A. Naji, Sherif Khattab and Fatma A. Omara
A Self-Organizing Cooperation for Autonomous Agents Based onImmune Network
Abstract: In order to solve the cooperation of autonomous agent systems,an artificial immune networkcooperation algorithm is proposed,which is based on Jerne’s idiotypic immune network hypothesis. A sheepdogherdi...
Comparative Analysis of Collaborative Filtering Technique
Today it is almost impossible to retrieve information with a keyword search when the information is spread over several pages. The Semantic Web is an extension of the current web in which information is given &nb...
Dynamic Passwords Using Graphics
Abstract:Textual passwords are most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are intro...
Enhancement of Security in DNA Based Cryptography
Abstract: DNA containing data obtained from more conventional binary storage media. Plaintext messagedata encoded in DNA strands by use of a (publicly known) Key of alphabet of short oligonucleotide sequences
Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...