Proposed Secured Remote E-Voting Model based on Blind Signature

α
Reham Mohamed Kouta
Reham Mohamed Kouta
σ
Dr. Essam-Eldean F. Elfakharany
Dr. Essam-Eldean F. Elfakharany
ρ
Dr. Wafaa Boghdady Mohamed
Dr. Wafaa Boghdady Mohamed
α Arab Academy for Science, Technology, and Maritime Transport

Send Message

To: Author

Proposed Secured Remote E-Voting Model based on Blind Signature

Article Fingerprint

ReserarchID

CSTNWSHQ2CD

Proposed Secured Remote E-Voting Model based on Blind Signature Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

We proposed a secured e-voting system model by using blind signature. Our proposed model meets all security requirements which are: (authentication, privacy, integrity, non repetition). Our proposed model depends on these main entities that are involved within the voting processes (voter registration, voting, counting, audit), and these entities are: certificate authority, ministry of interior, voter, high committee of elections (investigator), and counter. The voter can vote from any remote with secured data transfer (ballot) by using the blind signature to blinded ballot and then sign it. When it is sent to the high committee of elections (investigator) for checking the voter eligibility, there is an encrypting random value (r) that is attached with the blind ballot, using for removing blind the ballot which is encrypted by counter’s public key. The high committee of elections checks the signature of voter and checks that if he is an eligible voter or not. Then removes the voter’s digital signature and puts his digital signature and then sends it to the counter party. The counter party checks the signature of high committee of election and extracts the random value (r) by decrypting with his private key and removing the blind ballot and counts the vote.

References

7 Cites in Article
  1. Ibrahim Subariah,Mazleena Salleh,Maznah Kamat (2000). Electronic Voting System: Preliminary Study.
  2. Ibrahim Subariah,Mazleena Salleh,Maznah Kamat (1999). Design of a Secure Web-Based Electronic Voting System.
  3. R Cramer,R Gennaro,B Schoenmakers,M Yung (1996). Multi-Authority Secret-Ballot Elections with Linear Works.
  4. L Cranor,R Cytron (1996). Sensus: a security-conscious electronic polling system for the Internet.
  5. W Stalling (2003). Book Reviews : Communicating Facts and Ideas in Business. Leland Brown, 3rd Edition, Prentice-Hall, Inc., Englewood Cliffs, New Jersey,1982.
  6. Subariah Ibrahim,Maznah Kamat,Mazleena Salleh,S Aziz (null). Secure E-voting with blind signature.
  7. Robling Denning (1982). Cryptography and Data Security.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Reham Mohamed Kouta. 1970. \u201cProposed Secured Remote E-Voting Model based on Blind Signature\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E13): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 25274
Total Downloads: 10865
2026 Trends
Related Research

Published Article

We proposed a secured e-voting system model by using blind signature. Our proposed model meets all security requirements which are: (authentication, privacy, integrity, non repetition). Our proposed model depends on these main entities that are involved within the voting processes (voter registration, voting, counting, audit), and these entities are: certificate authority, ministry of interior, voter, high committee of elections (investigator), and counter. The voter can vote from any remote with secured data transfer (ballot) by using the blind signature to blinded ballot and then sign it. When it is sent to the high committee of elections (investigator) for checking the voter eligibility, there is an encrypting random value (r) that is attached with the blind ballot, using for removing blind the ballot which is encrypted by counter’s public key. The high committee of elections checks the signature of voter and checks that if he is an eligible voter or not. Then removes the voter’s digital signature and puts his digital signature and then sends it to the counter party. The counter party checks the signature of high committee of election and extracts the random value (r) by decrypting with his private key and removing the blind ballot and counts the vote.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Proposed Secured Remote E-Voting Model based on Blind Signature

Reham Mohamed Kouta
Reham Mohamed Kouta Arab Academy for Science, Technology, and Maritime Transport
Dr. Essam-Eldean F. Elfakharany
Dr. Essam-Eldean F. Elfakharany
Dr. Wafaa Boghdady Mohamed
Dr. Wafaa Boghdady Mohamed

Research Journals