Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTNWSHQ2CD
We proposed a secured e-voting system model by using blind signature. Our proposed model meets all security requirements which are: (authentication, privacy, integrity, non repetition). Our proposed model depends on these main entities that are involved within the voting processes (voter registration, voting, counting, audit), and these entities are: certificate authority, ministry of interior, voter, high committee of elections (investigator), and counter. The voter can vote from any remote with secured data transfer (ballot) by using the blind signature to blinded ballot and then sign it. When it is sent to the high committee of elections (investigator) for checking the voter eligibility, there is an encrypting random value (r) that is attached with the blind ballot, using for removing blind the ballot which is encrypted by counter’s public key. The high committee of elections checks the signature of voter and checks that if he is an eligible voter or not. Then removes the voter’s digital signature and puts his digital signature and then sends it to the counter party. The counter party checks the signature of high committee of election and extracts the random value (r) by decrypting with his private key and removing the blind ballot and counts the vote.
Reham Mohamed Kouta. 1970. \u201cProposed Secured Remote E-Voting Model based on Blind Signature\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E13): .
Article content is being processed or not available yet.
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 113
Country: Egypt
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Reham Mohamed Kouta, Dr. Essam-Eldean F. Elfakharany, Dr. Wafaa Boghdady Mohamed (PhD/Dr. count: 2)
View Count (all-time): 277
Total Views (Real + Logic): 25258
Total Downloads (simulated): 11161
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
We proposed a secured e-voting system model by using blind signature. Our proposed model meets all security requirements which are: (authentication, privacy, integrity, non repetition). Our proposed model depends on these main entities that are involved within the voting processes (voter registration, voting, counting, audit), and these entities are: certificate authority, ministry of interior, voter, high committee of elections (investigator), and counter. The voter can vote from any remote with secured data transfer (ballot) by using the blind signature to blinded ballot and then sign it. When it is sent to the high committee of elections (investigator) for checking the voter eligibility, there is an encrypting random value (r) that is attached with the blind ballot, using for removing blind the ballot which is encrypted by counter’s public key. The high committee of elections checks the signature of voter and checks that if he is an eligible voter or not. Then removes the voter’s digital signature and puts his digital signature and then sends it to the counter party. The counter party checks the signature of high committee of election and extracts the random value (r) by decrypting with his private key and removing the blind ballot and counts the vote.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.