a method to encrypt data which can only be decrypted at
specified time this can be useful to encrypt some time sensitive data like
bidding offer or electronic vote. They used a combination of public key
encryption and hash function to enable decryption only at certain time. But
this method does not cover communication between client and server and how to
store votes in the database in a secure manner1.
To protect the confidentiality of the voters, they design
a paper ballot that will be teared after people have given a vote. The teared paper
ballot then can be used to count the voting result while maintaining voter
privacy. Unlike the conventional paper ballot which always have parties and
candidates printed on the same order, this method randomized the order, but
still can be correctly counted2.
There are some related research regarding this issues. The
overall design of e-voting
infrastructure was proposed in this. They built a working ecosystem to deploy a
remote voting and ensure its security especially the verifiability to ensure
the votes are valid and able to detect unauthorized one. The mechanism was to
match several parts of the secure key in some servers3.
The attack to the verifiability of vote data was given in
this. The clash attack was simple since it exploited the voting machine to
supply different votes from the same voter. The author provided the
countermeasure by using the serial number on
printed receipt to Wombat and Helios e-voting systems4.
Another ballot integrity procedure was proposed by
employing entanglement between two parties5.
There were three phases included: initial, voting, and
verification phase. A formal model for both weak and strong verifiability. They
proof the proposed model to Helios-C(Helios with Credential) system. However,
we propose another system to provide more secure ballot in e- voting
environment built on top of our own system6.
this system, assuming that every person has smart phone they had design a smart
phone compatible application. In this application they had authenticated the
user by its aadhar card number along with biometrics such as face recognition
or finger print recognition. After authenticating user will able to see list of
candidates. Then the vote of user will be stored on database server. This
transmission of data from end user application to database server will be
encrypted by using cryptography. For this purpose AES algorithm will be used7.
Technology moulds the life style of human in a
promoting manner. We prefer reducing time and efforts in all our chores. One of
the systems used majorly for this purpose is ON-LINE where security is the
major concern. This paper provides a secure approach for online voting system
using the concept of encryption and digital signature. We have implemented the
concept of AES and RSA algorithm8.
E-Voting means the voting process in election by using electronic device. In
this proposed system described how the android mobile phones are efficient and
can be used for voting. The android platform is used to develop an application.
Our system support simultaneous voting due to the distributed nature of the
database. During election electronic device is used for voting process. A voter
may only need to register only once for a particular election and that does
all, voter need to cast his /her vote without actually have to present at the
voting cell. The registration process must be done at Booth application for
once then voter is been given a facility to vote from his/her Android mobile
phone irrespective of his/her location. This proposed system suppose to propose
a new e-voting system, which ensures voter confidentiality and voting accuracy,
thus providing an important framework that based on unique identification
ADHAAR ID (U-ID) number. An online solution is very useful as the information
about the voters and the election committee is also made available to the
people in this system9.
is an important part of the democratic process.
The electorate makes a decision or expresses an opinion that is accepted for
everyone. Some parts could be interested in the election results deviation
without anyone else noticing it. However, ensuring that the whole voting
process is performed correctly and according to current rules and law is, then,
even more important. We present in this work a review of existing verification
systems for electronic voting systems, from both academia and the commercial
world. To do so, we realize a fair comparison against a set of representative
voting verification systems, by using an evaluation framework. We define this
framework to be composed of several properties and covering important system
areas, ranging from the user interaction to security issues. We then model the
natural evolution of verifiability issues on electronic voting systems, which
are influenced by restrictions on current laws and by technological advances10.
voting has been an active research field for application of cryptographic
techniques in the last two decades with many schemes and systems in
publication. In this paper we present an overview of recent efforts in
developing voting schemes and security models that involve a variety of real
world constraints to ensure election integrity. We classify voting schemes
based on their primary cryptographic techniques. We analyze recent typical
schemes and systems against the basic and counter attack requirements with
brief description. Such analysis shows difference among these security
requirements and aids in design of future schemes. Our conclusion is provided
regarding suitability of a particular voting system/scheme under various