Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Use of Elliptic Curves in Cryptography
CRYPTO '85 Advances in Cryptology
A Cryptographic Scheme for Computerized Elections
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
Towards a Practical, Secure, and Very Large Scale Online Election
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Internet Voting: Concerns and Solutions
CW '02 Proceedings of the First International Symposium on Cyber Worlds (CW'02)
An Anonymous Electronic Voting Protocol for Voting Over The Internet
WECWIS '01 Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01)
Sensus: A Security-Conscious Electronic Polling System for the Internet
HICSS '97 Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3
Candidate-resolved online voting protocol using distributed ElGamal Cryptosystem
Proceedings of the CUBE International Information Technology Conference
Hi-index | 0.00 |
A wide number of Internet voting systems have been implemented over the years for voluntary and mandatory purposes with mixed results. In 2002, Wu and Sankaranarayana [] proposed a simple protocol for Internet voting. However, their protocol does not satisfy all properties of an ideal Internet voting protocol. In this paper, we propose an improved Internet voting protocol like anonymity, third party verification and avoidance of double voting. To make it more secure and computationally faster, the proposed protocol has been developed using elliptic curve cryptosystem.