SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 301
Secure Verifiable Mobile Voting Based On
Kerberos Mechanism
Abdullahi Yahya Imam
(Department of Information Technology, Bayero University, Kano, Nigeria)
Email:ayimam.it@buk.edu.ng
-------------------------**********************************---------------------------
Abstract:
Recent technological breakthroughs make the use of mobile smartphones in our daily lives so ubiquitous.
Democratic systems mostly depend on elections to provide teeming electorates the right to vote for their
leaders or to express their views in referendums. In literature, several electronic voting systems from
standalone to mobile were proposed. However, a valid and usable electronic voting system supposes to
meet some requirements among which vote verifiability is a challenge to many of the current systems.
Thus, this paper proposes a mobile phone e-voting system based on Kerberos authentication mechanism
which achieves vote verifiability using a cryptographic tag each voter produces independently. The
proposed system uses secure symmetric key cryptography to fit the most used mobile devices’
performance.
Keywords —electronic voting, verifiability, cryptographic tag,Kerberos authentication, two–factor
authentication.
----------------------------------------************************----------------------------------
I. INTRODUCTION
The advent of smartphones made mobile voting
a research area. Nowadays people use smartphones
in their daily activities such as mobile banking,
online shopping and many more. Thus, mobile
voting should also not be an exception. Recently,
several works propose different mobile phone
voting schemes. Unlike traditional voting system,
known as paper-based, electronic voting provides
platform where electronic devices are used to carry
out the tasks. It is not vague that paper-based
schemes could have less performance and accuracy
than electronic voting system. Certainly, electronic
voting protocol has some additional requirements
compared to traditional paper–based schemes. An
ideal voting protocol of secure electronic voting has
the following requirements [1]:
(a) Only authenticated and authorized voters
can cast vote in an election.
(b) The system does not allow anyone to cast
vote more than once.
(c) Neither voting authority nor election
participant can determine for whom anyone
else voted.
(d) There is no way someone’s vote can be
duplicated.
(e) Any change to voter’s choice can be
detected.
(f) Every voter can make sure that his vote has
been taken into account in the final
tabulation.
(g) Everyone knows who voted and who didn’t.
In addition to these, mobile voting also needs
internet connection. Thus it is prone to more
security challenges than standalone ones. If
implemented successfully, mobile votingsystem
would provide more flexibility and mobility
compared to a standalone electronic system which
requires the presence of the voter at the voting
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 302
booth. It also allows a voter to cast his vote from
his convenient location as long as the Internet
service is available therein. Among the above
mentioned requirements, vote verifiability—every
voter can make sure that his vote has been taken
into account in the final tabulation and everyone
knows who voted and who did not vote—happens
to be a challenge to many electronic voting systems.
Popoveniuc et al. [2] describes end–to–end
verifiable election as one which meets the following
performance requirements.
a) The representation of the voter’s choices on
the ballot agrees with the representation that
will be read by the rest of the election
system.
b) Cast ballots do not contain over-votes or
negative votes.
c) The ballot the voter cast is the one that was
received and saved by the voting system.
d) No ballots are included in the final tally that
could not have been checked by at least one
voter.
In order to achieve some of the stated
requirements, there are some proposed schemes that
enable the voter to retrieve his vote from voting
authority to ensure it is recorded as voted. But such
schemes could be vulnerable to buying and selling
of votes as the buyer can ensure that the seller votes
as promised. To mitigate such scenario, some
receipt-free schemes were proposed which make it
impossible for a voter to reveal the way he voted
[1].
This work proposes a mobile phone voting
scheme that enables vote verifiability as well as
eliminating buying and selling ofthe votes. Thus,
this scheme is in between the above two mentioned
schemes. It uses some of Kerberos authentication
mechanisms along with a cryptographic tag.
The remainder of this paper is organized as
follows. Section 2 provides literature review of the
related works. Section 3 states the design goals,
while section 4 explains the proposed model and
design. Section 5 gives justification of the design
goals of the proposed model. Section 6 draws
conclusions.
II. LITERATURE REVIEW OF THE
RELATED WORKS
This section reviews some related works from
standalone electronic voting to fully mobile phone
voting systems. In literature, several attempts were
put in place to achieve deployable electronic voting
systems. Chaum proposed the verifiable electronic
voting scheme using blind signature [3]. Recently,
[4] came up with a way based on blind signature
and Kerberos mechanism to provide a lightweight
scheme by removal of the Certificate Authority and
the use of symmetric key algorithms throughout the
system. Blind signature schemes can provide
secrecy and individually verifiable (every voter can
make sure that his vote has been taken into account
in the final tabulation) but does not support
universal verifiability (everyone knows who voted
and who didn’t).
Kazue and Joe [5] present a receipt-free scheme
that facilitates both individual and universal
verifiable voting protocol. The scheme is based on
the mix-type voting technique that uses collection
of servers to shuffle the encrypted votes till the
relationship between the voter and vote is hidden.
Such scheme is categorized as inefficient for large
scale voting as it incurs high computational
overhead.
In 2013 Estonian local municipal elections and
the 2014 European Parliament elections a scheme
known as Verifiable Internet Voting in Estonia was
used [6]. The scheme allows the voters to check the
cast-as-intended and recorded-as-cast properties of
their vote by using a mobile device. The voter
retrieves the encrypted vote from the voting server
then applies some cryptographic calculations to
verify. This provides individual verifiability only.
Moreover, it requires the voter to use two different
devices-one for voting and the other for verification
processes- and yet it is vulnerable to buying and
selling of votes as the buyer can make the voter to
prove what he voted for.
Besides the aforementioned, there are some
proposed mobile voting schemes in the literature
[7], [8], [9] and [10]. Based on my survey, most of
them do not concentrate on vote verifiability rather
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 303
than authentication and confidentiality.
III. DESIGN GOALS
From the literature survey, existing mobile
voting schemes mostly do not provide solution to
vote verifiability. As discussed, they mostly
propose solutions to authentication and
authorization alone. Considering its importance in
achieving free and fair election, this work suggests
a mobile voting scheme that meets the following
requirements:
1. Efficient use of secure symmetric
cryptographic algorithms to suit most
mobile devices performance.
2. Only authenticated and authorized voters
can vote.
3. No one can determine for whom anyone else
voted.
4. Every voter can make sure that his vote has
been taken into account in the final
tabulation.
5. Everyone knows who voted and who didn’t.
6. Cast ballots do not contain over-votes or
negative votes.
IV. PROPOSED SYSTEM MODEL AND
DESIGN
This section describes the model of the
proposed voting system with detailed explanation
of how it works. The scheme is mainly made of the
following phases: two-level voter authentication,
secure cryptographic tag generation and vote, vote
tabulation and verifiability. Fig.1 contains the
architectural design of the proposed system.
Voter Authentication Server (VAS) has the
database of registered voters before the Election
Day. The database maintains Voter Card Number
VCN which identifies a voter, registered mobile
phone and secure password of each voter.
VAS follows these steps to determine an eligible
voter in the election period:
a. A prospective voter (V) sends his plaintext VCN
to VAS which decides eligible of the voter.
b. VAS sends identity authentication SMS to only
eligible voter’s registered phone number.
c. The voter uses his password, generates
symmetric key Kp to encrypt the identity
authentication code received and sends it via
Internet to VAS.
d. VAS generates similar symmetric key Kp from
corresponding voter’s password in its database
and decrypts the identity authentication code.
e. VAS then generates a unique symmetric voting
key Kv, encrypts it with Kp and sends to a
successfully authenticated voter.
f. It also sends the copy of that Kv to Voting Box
Server VBS.
Fig.1 Architecture of the proposed system
4.1 Voter Two-Level Authentication Phase
4.2 Generating Secure Vote Verification Tag and
VOTE Phase
The ability of each and every voter to
securely produce a unique and easily identifiable
tag that does not reveal confidential information
about the candidate he elected is the substantial
stage to achieve vote verifiability in our scheme. In
the election, every voter generates such tag and
attaches to his chosen candidate. We termed this tag
as SVVT (Secure Vote Verification Tag). Each voter
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 304
prepares SVVT and casts his vote using the
following VOTE Preparation:
Algorithm:
Description of the above algorithm:
a. Random Number Generation: voter generates
random number R.
b. Pre-SVVT: voter uses his given Kv to encrypt R.
c. SVVT: voter takes the SHA-2 of the Pre-SVVT.
d. VOTE: voter combines the copy of his SVVT to
the candidate and encrypts with Kv. He then
sends it to VBS.
4.3 Vote Tabulation and Verifiability Phase
Once VBS receives a VOTE from a voter, it
applies the corresponding Kv it receives from VAS
to decrypt that vote. It then tallies the valid vote as
follows:
= ( ){ ℎ 	||		 }
a. VBS takes the choice into tabulation and
sends the SVVT to VAS via secure channel.
b. VAS then marks voter as voted and records
the SVVT for the respective voter. It also
sends the SVVT copy to the voter to verify.
c. When the election time is over, VAS
announces publically the voters with their
respective SVVT and voting status (either
voted or not voted).
d. On the other hand, VBS also independently
announces the candidates with their
respective tallies.
e. Individuals and publics can use the two
independent releases from VAS and VBS to
validate the election result.
V. JUSTIFICATION OF OUR STATED
DESIGN GOALS
This section discusses the justification and
analysis of our design goals. The syste implemented
in Java programming for Android
platforms.Following are the design goals along with
their corresponding validations.
a. Efficient use of Symmetric Cryptographic
Algorithms to Suit Most Mobile Devices:
Using algorithms that can perform
efficiently is of paramount importance to our
proposed system. Basically, Kerberos release
from MIT uses Data Encryption Standard
(DES) algorithm. Due to short key length and
some other security challenges, Nowadays DES
is considered as less secure. SinceI incorporate
some of Kerberos authentication mechanisms
into the work and at the same it wants achieve
high security, I use Advanced Encryption
Standard (AES-128) algorithms rather than
DES. However, to determine the performance
overhead that AES128 can incur compared to
DES, I implemented and tested the work using
both the DES and AES128 algorithms. Table 1
contains the results of the measurements.The
test was performed on some of the commonly
used android devices.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 305
Table 1 Sampled Devices and Measurements
We recorded the VOTE Preparation
Algorithm running time on the devices whose
specifications are as in Table 1.
Fig.2 Performances graph for DES & AES-128
Based on this result, it is clear that the
performance overhead incurred by AES128 is more
affordable compared to basicDES.Thus, the
proposed system can perform well on commonly
used Android smartphones.
b. Only Authorized Voters Can Vote:each voter
authenticates himself with VAS before getting
the voting key which serves as a ticket to cast
vote in VBS. Sending authentication code to
voter’s mobile phone along with using his/her
password for encrypting furthercommunications
between VAS and a voter proves that only the
outright owner of the phone
and the password can
authenticate successfully.
c. No One Can Determine
For Whom Anyone Else
Voted:the separation of the
voting system into VAS and
VBS enables each entity to
maintain some specific
information that helps
accomplish this goal. VAS
maintains the voters’ database
and acts as voting-key
generator as well. It does not
have access to the votes
throughout the election. Meanwhile, the VBS
which receives encrypted votes from voters
does not have access to the voters’ database
residing in AS. Thus, it does not know detailed
identity of the voter. It only knows the voting
key that can decrypts the received vote.
d. Every Voter Can Make Sure That His Vote
Has Been Taken Into Account In The Final
Tabulation: a voter prepares VOTE and sends
to VBS which decrypts and separates it into
choice and SVVT. It then tallies the valid voter’s
choice.
e. Everyone Knows Who Voted And Who
Didn’t:from the information VAS releases,
voters can compare the list of the voter with
tallies from VBS. Every voter must find his
exact SVVT in VAS list. Everyone can check
the list from VAS to determine who voted. If
need arises, anyone can ask the voters to submit
their SVVT to verify no one is missing from the
list.
f. Cast Ballots Do Not Contain Over-Votes Or
Negative Votes:the independent results from
VBS must follow the result VAS releases. An
inconsistency in the two separate information
leads to invalid result.
Device
Model
Processor RAM Android
OS
Version
DES:
Vote
Preparation
Time
(in Micro
second)
AES-128:
Vote
Preparation
Time
(in Micro
second)
Samsung
GT-S531F
1.2 GHz
Quad
Core
1GB 5.1.1 2546 3690
Samsung
SM-
G360H 1.1GHz
1GB 4.4 3070 3787
HTC
Desire 626
1.7 GHz
Octa-core
2GB 4.4.2 2912 3575
Samsung
SGH-I747
1.5GHz
Advanced
dual Core
2GB 4.4 2872 3377
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 306
VI. CONCLUSION
This paper describes a verifiable mobile voting
system that incorporates some of Kerberos
authentication mechanisms. It explains how to
achieve secure voter authentication using some of
Kerberos mechanisms which employ two-factor
authentication. This work achieves its main target,
both individual and public vote verifiability, using a
cryptographic tag that does not reveal information
about the voter’s choice rather than enabling him to
track his vote. Finally, majority of currently used
android devices can also support the proposed
system with less performance overhead.
REFERENCES
[1] S. Bruice, Applied Cryptography: Protocols,
Algorithms, and Source Code in C (2nd
ed.).
(Sharda OffPress, Delhi:Wiley), (2001).
p.121.
[2] S. Popoveniuc, J. Kelsey, A. Regenscheid
and P. Vora, “Performance requirements
for end-to-end verifiable elections”, In
Proceedings of the 2010 international
conference on Electronic voting
technology/workshop on trustworthy
elections, (EVT/WOTE’10, 2010). p.1-16.
[3] D. Chaum, “Untraceable electronic mail,
return addresses, and digital pseudonyms”
(Communications of the ACM, 1981), pp.
84-88.
[4] Z. Hongyu, Y. Qianzi and Z. Junxing, “A
lightweight electronic voting scheme based
on blind signature and Kerberos
mechanism”, IEEE 2015, pp. 210-214.
[5] S. Kazue and K. Joe, “Receipt-Free Mix-
Type Voting Scheme --A practical solution
to the implementation of a voting booth”,
Advances in Cryptology—EUROCRYPT
’95 Proceedings, (Springer-Verlag, 1995),
pp. 393-403.
[6] H. Ven and W. Jan, “Verifiable Internet
Voting in Estonia”, Proceedings of 2014
International Conference on Electronic
Voting EVOTE 2014, (E-Voting.CC GmbH,
2014), pp. 1-7.
[7] P. Deniel and A. S. Dan, “A Hybrid Mobile
Biometric-Based E-Voting System”,Proc. of
the 9th
International Symposium on
Advanced Topics in Electrical Engineering,
May 7-9, 2015, (Bucharest, Romania, IEEE,
2015), pp. 37-42.
[8] K. Adel, G. Yasmin, S. Dima, M. Dalya and
Shastry P.V.S, “M-Vote: A Reliable and
Highly Secure Mobile Voting System”,Proc.
of 2013 Palestinian International
Conference on Information and
Communication Technology, (IEEE, 2013),
pp. 90-98.
[9] K. A. Hussein , S. I. Mohammad and M. D.
Omar, “Secure Internet Voting System
based on Public Key Kerberos” ,
Proceedings of IJCSI International Journal
of Computer Science Issues, (Vol. 9, Issue
2, No 3, 2012), pp. 428-434.
[10] U. Mohib, I. U. Arif, Noor ul Amin
and Nizamuddin, “An Efficient and Secure
Mobile Phone Voting System”, (IEEE,
2013), pp. 332-336.

More Related Content

What's hot

Online e voting
Online e votingOnline e voting
Online e votingMerbinJose
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONIJNSA Journal
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET Journal
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMabadmgr
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS cscpconf
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile smseSAT Journals
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET Journal
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)vasim hasina
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting systemLhakpa Yangji
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higherMorine Gakii
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsCloud Vote
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodhVinodh Kumar
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Votingashevch
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting systemjannatul haque
 

What's hot (20)

Online e voting
Online e votingOnline e voting
Online e voting
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
 
M voting
M votingM voting
M voting
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
 
M – Voting
M – VotingM – Voting
M – Voting
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
 
E voting app
E voting appE voting app
E voting app
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
 
F1802024245
F1802024245F1802024245
F1802024245
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodh
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Voting
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
 
E-voting
E-votingE-voting
E-voting
 

Similar to Secure Verifiable Mobile Voting Based On Kerberos Mechanism

project presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxproject presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxmuralimurali239921
 
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology abdallah76803
 
Blockchain Based E-Voting System
Blockchain Based E-Voting SystemBlockchain Based E-Voting System
Blockchain Based E-Voting SystemIRJET Journal
 
IRJET- A Decentralized Voting Application using Blockchain Technology
IRJET- 	 A Decentralized Voting Application using Blockchain TechnologyIRJET- 	 A Decentralized Voting Application using Blockchain Technology
IRJET- A Decentralized Voting Application using Blockchain TechnologyIRJET Journal
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Internet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain TechnologyInternet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain TechnologyIRJET Journal
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET Journal
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting SystemIRJET Journal
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java ServletsIRJET Journal
 
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAINDECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAINIRJET Journal
 
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter CardsSafe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cardsijcisjournal
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Securitysmeetramteke
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting SystemIRJET Journal
 

Similar to Secure Verifiable Mobile Voting Based On Kerberos Mechanism (20)

project presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxproject presentation -2 nov (2).pptx
project presentation -2 nov (2).pptx
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
 
F017513138
F017513138F017513138
F017513138
 
Blockchain Based E-Voting System
Blockchain Based E-Voting SystemBlockchain Based E-Voting System
Blockchain Based E-Voting System
 
IRJET- A Decentralized Voting Application using Blockchain Technology
IRJET- 	 A Decentralized Voting Application using Blockchain TechnologyIRJET- 	 A Decentralized Voting Application using Blockchain Technology
IRJET- A Decentralized Voting Application using Blockchain Technology
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Internet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain TechnologyInternet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain Technology
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAINDECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
 
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter CardsSafe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Secure Verifiable Mobile Voting Based On Kerberos Mechanism

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 301 Secure Verifiable Mobile Voting Based On Kerberos Mechanism Abdullahi Yahya Imam (Department of Information Technology, Bayero University, Kano, Nigeria) Email:ayimam.it@buk.edu.ng -------------------------**********************************--------------------------- Abstract: Recent technological breakthroughs make the use of mobile smartphones in our daily lives so ubiquitous. Democratic systems mostly depend on elections to provide teeming electorates the right to vote for their leaders or to express their views in referendums. In literature, several electronic voting systems from standalone to mobile were proposed. However, a valid and usable electronic voting system supposes to meet some requirements among which vote verifiability is a challenge to many of the current systems. Thus, this paper proposes a mobile phone e-voting system based on Kerberos authentication mechanism which achieves vote verifiability using a cryptographic tag each voter produces independently. The proposed system uses secure symmetric key cryptography to fit the most used mobile devices’ performance. Keywords —electronic voting, verifiability, cryptographic tag,Kerberos authentication, two–factor authentication. ----------------------------------------************************---------------------------------- I. INTRODUCTION The advent of smartphones made mobile voting a research area. Nowadays people use smartphones in their daily activities such as mobile banking, online shopping and many more. Thus, mobile voting should also not be an exception. Recently, several works propose different mobile phone voting schemes. Unlike traditional voting system, known as paper-based, electronic voting provides platform where electronic devices are used to carry out the tasks. It is not vague that paper-based schemes could have less performance and accuracy than electronic voting system. Certainly, electronic voting protocol has some additional requirements compared to traditional paper–based schemes. An ideal voting protocol of secure electronic voting has the following requirements [1]: (a) Only authenticated and authorized voters can cast vote in an election. (b) The system does not allow anyone to cast vote more than once. (c) Neither voting authority nor election participant can determine for whom anyone else voted. (d) There is no way someone’s vote can be duplicated. (e) Any change to voter’s choice can be detected. (f) Every voter can make sure that his vote has been taken into account in the final tabulation. (g) Everyone knows who voted and who didn’t. In addition to these, mobile voting also needs internet connection. Thus it is prone to more security challenges than standalone ones. If implemented successfully, mobile votingsystem would provide more flexibility and mobility compared to a standalone electronic system which requires the presence of the voter at the voting RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 302 booth. It also allows a voter to cast his vote from his convenient location as long as the Internet service is available therein. Among the above mentioned requirements, vote verifiability—every voter can make sure that his vote has been taken into account in the final tabulation and everyone knows who voted and who did not vote—happens to be a challenge to many electronic voting systems. Popoveniuc et al. [2] describes end–to–end verifiable election as one which meets the following performance requirements. a) The representation of the voter’s choices on the ballot agrees with the representation that will be read by the rest of the election system. b) Cast ballots do not contain over-votes or negative votes. c) The ballot the voter cast is the one that was received and saved by the voting system. d) No ballots are included in the final tally that could not have been checked by at least one voter. In order to achieve some of the stated requirements, there are some proposed schemes that enable the voter to retrieve his vote from voting authority to ensure it is recorded as voted. But such schemes could be vulnerable to buying and selling of votes as the buyer can ensure that the seller votes as promised. To mitigate such scenario, some receipt-free schemes were proposed which make it impossible for a voter to reveal the way he voted [1]. This work proposes a mobile phone voting scheme that enables vote verifiability as well as eliminating buying and selling ofthe votes. Thus, this scheme is in between the above two mentioned schemes. It uses some of Kerberos authentication mechanisms along with a cryptographic tag. The remainder of this paper is organized as follows. Section 2 provides literature review of the related works. Section 3 states the design goals, while section 4 explains the proposed model and design. Section 5 gives justification of the design goals of the proposed model. Section 6 draws conclusions. II. LITERATURE REVIEW OF THE RELATED WORKS This section reviews some related works from standalone electronic voting to fully mobile phone voting systems. In literature, several attempts were put in place to achieve deployable electronic voting systems. Chaum proposed the verifiable electronic voting scheme using blind signature [3]. Recently, [4] came up with a way based on blind signature and Kerberos mechanism to provide a lightweight scheme by removal of the Certificate Authority and the use of symmetric key algorithms throughout the system. Blind signature schemes can provide secrecy and individually verifiable (every voter can make sure that his vote has been taken into account in the final tabulation) but does not support universal verifiability (everyone knows who voted and who didn’t). Kazue and Joe [5] present a receipt-free scheme that facilitates both individual and universal verifiable voting protocol. The scheme is based on the mix-type voting technique that uses collection of servers to shuffle the encrypted votes till the relationship between the voter and vote is hidden. Such scheme is categorized as inefficient for large scale voting as it incurs high computational overhead. In 2013 Estonian local municipal elections and the 2014 European Parliament elections a scheme known as Verifiable Internet Voting in Estonia was used [6]. The scheme allows the voters to check the cast-as-intended and recorded-as-cast properties of their vote by using a mobile device. The voter retrieves the encrypted vote from the voting server then applies some cryptographic calculations to verify. This provides individual verifiability only. Moreover, it requires the voter to use two different devices-one for voting and the other for verification processes- and yet it is vulnerable to buying and selling of votes as the buyer can make the voter to prove what he voted for. Besides the aforementioned, there are some proposed mobile voting schemes in the literature [7], [8], [9] and [10]. Based on my survey, most of them do not concentrate on vote verifiability rather
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 303 than authentication and confidentiality. III. DESIGN GOALS From the literature survey, existing mobile voting schemes mostly do not provide solution to vote verifiability. As discussed, they mostly propose solutions to authentication and authorization alone. Considering its importance in achieving free and fair election, this work suggests a mobile voting scheme that meets the following requirements: 1. Efficient use of secure symmetric cryptographic algorithms to suit most mobile devices performance. 2. Only authenticated and authorized voters can vote. 3. No one can determine for whom anyone else voted. 4. Every voter can make sure that his vote has been taken into account in the final tabulation. 5. Everyone knows who voted and who didn’t. 6. Cast ballots do not contain over-votes or negative votes. IV. PROPOSED SYSTEM MODEL AND DESIGN This section describes the model of the proposed voting system with detailed explanation of how it works. The scheme is mainly made of the following phases: two-level voter authentication, secure cryptographic tag generation and vote, vote tabulation and verifiability. Fig.1 contains the architectural design of the proposed system. Voter Authentication Server (VAS) has the database of registered voters before the Election Day. The database maintains Voter Card Number VCN which identifies a voter, registered mobile phone and secure password of each voter. VAS follows these steps to determine an eligible voter in the election period: a. A prospective voter (V) sends his plaintext VCN to VAS which decides eligible of the voter. b. VAS sends identity authentication SMS to only eligible voter’s registered phone number. c. The voter uses his password, generates symmetric key Kp to encrypt the identity authentication code received and sends it via Internet to VAS. d. VAS generates similar symmetric key Kp from corresponding voter’s password in its database and decrypts the identity authentication code. e. VAS then generates a unique symmetric voting key Kv, encrypts it with Kp and sends to a successfully authenticated voter. f. It also sends the copy of that Kv to Voting Box Server VBS. Fig.1 Architecture of the proposed system 4.1 Voter Two-Level Authentication Phase 4.2 Generating Secure Vote Verification Tag and VOTE Phase The ability of each and every voter to securely produce a unique and easily identifiable tag that does not reveal confidential information about the candidate he elected is the substantial stage to achieve vote verifiability in our scheme. In the election, every voter generates such tag and attaches to his chosen candidate. We termed this tag as SVVT (Secure Vote Verification Tag). Each voter
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 304 prepares SVVT and casts his vote using the following VOTE Preparation: Algorithm: Description of the above algorithm: a. Random Number Generation: voter generates random number R. b. Pre-SVVT: voter uses his given Kv to encrypt R. c. SVVT: voter takes the SHA-2 of the Pre-SVVT. d. VOTE: voter combines the copy of his SVVT to the candidate and encrypts with Kv. He then sends it to VBS. 4.3 Vote Tabulation and Verifiability Phase Once VBS receives a VOTE from a voter, it applies the corresponding Kv it receives from VAS to decrypt that vote. It then tallies the valid vote as follows: = ( ){ ℎ || } a. VBS takes the choice into tabulation and sends the SVVT to VAS via secure channel. b. VAS then marks voter as voted and records the SVVT for the respective voter. It also sends the SVVT copy to the voter to verify. c. When the election time is over, VAS announces publically the voters with their respective SVVT and voting status (either voted or not voted). d. On the other hand, VBS also independently announces the candidates with their respective tallies. e. Individuals and publics can use the two independent releases from VAS and VBS to validate the election result. V. JUSTIFICATION OF OUR STATED DESIGN GOALS This section discusses the justification and analysis of our design goals. The syste implemented in Java programming for Android platforms.Following are the design goals along with their corresponding validations. a. Efficient use of Symmetric Cryptographic Algorithms to Suit Most Mobile Devices: Using algorithms that can perform efficiently is of paramount importance to our proposed system. Basically, Kerberos release from MIT uses Data Encryption Standard (DES) algorithm. Due to short key length and some other security challenges, Nowadays DES is considered as less secure. SinceI incorporate some of Kerberos authentication mechanisms into the work and at the same it wants achieve high security, I use Advanced Encryption Standard (AES-128) algorithms rather than DES. However, to determine the performance overhead that AES128 can incur compared to DES, I implemented and tested the work using both the DES and AES128 algorithms. Table 1 contains the results of the measurements.The test was performed on some of the commonly used android devices.
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 305 Table 1 Sampled Devices and Measurements We recorded the VOTE Preparation Algorithm running time on the devices whose specifications are as in Table 1. Fig.2 Performances graph for DES & AES-128 Based on this result, it is clear that the performance overhead incurred by AES128 is more affordable compared to basicDES.Thus, the proposed system can perform well on commonly used Android smartphones. b. Only Authorized Voters Can Vote:each voter authenticates himself with VAS before getting the voting key which serves as a ticket to cast vote in VBS. Sending authentication code to voter’s mobile phone along with using his/her password for encrypting furthercommunications between VAS and a voter proves that only the outright owner of the phone and the password can authenticate successfully. c. No One Can Determine For Whom Anyone Else Voted:the separation of the voting system into VAS and VBS enables each entity to maintain some specific information that helps accomplish this goal. VAS maintains the voters’ database and acts as voting-key generator as well. It does not have access to the votes throughout the election. Meanwhile, the VBS which receives encrypted votes from voters does not have access to the voters’ database residing in AS. Thus, it does not know detailed identity of the voter. It only knows the voting key that can decrypts the received vote. d. Every Voter Can Make Sure That His Vote Has Been Taken Into Account In The Final Tabulation: a voter prepares VOTE and sends to VBS which decrypts and separates it into choice and SVVT. It then tallies the valid voter’s choice. e. Everyone Knows Who Voted And Who Didn’t:from the information VAS releases, voters can compare the list of the voter with tallies from VBS. Every voter must find his exact SVVT in VAS list. Everyone can check the list from VAS to determine who voted. If need arises, anyone can ask the voters to submit their SVVT to verify no one is missing from the list. f. Cast Ballots Do Not Contain Over-Votes Or Negative Votes:the independent results from VBS must follow the result VAS releases. An inconsistency in the two separate information leads to invalid result. Device Model Processor RAM Android OS Version DES: Vote Preparation Time (in Micro second) AES-128: Vote Preparation Time (in Micro second) Samsung GT-S531F 1.2 GHz Quad Core 1GB 5.1.1 2546 3690 Samsung SM- G360H 1.1GHz 1GB 4.4 3070 3787 HTC Desire 626 1.7 GHz Octa-core 2GB 4.4.2 2912 3575 Samsung SGH-I747 1.5GHz Advanced dual Core 2GB 4.4 2872 3377
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 306 VI. CONCLUSION This paper describes a verifiable mobile voting system that incorporates some of Kerberos authentication mechanisms. It explains how to achieve secure voter authentication using some of Kerberos mechanisms which employ two-factor authentication. This work achieves its main target, both individual and public vote verifiability, using a cryptographic tag that does not reveal information about the voter’s choice rather than enabling him to track his vote. Finally, majority of currently used android devices can also support the proposed system with less performance overhead. REFERENCES [1] S. Bruice, Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). (Sharda OffPress, Delhi:Wiley), (2001). p.121. [2] S. Popoveniuc, J. Kelsey, A. Regenscheid and P. Vora, “Performance requirements for end-to-end verifiable elections”, In Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections, (EVT/WOTE’10, 2010). p.1-16. [3] D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms” (Communications of the ACM, 1981), pp. 84-88. [4] Z. Hongyu, Y. Qianzi and Z. Junxing, “A lightweight electronic voting scheme based on blind signature and Kerberos mechanism”, IEEE 2015, pp. 210-214. [5] S. Kazue and K. Joe, “Receipt-Free Mix- Type Voting Scheme --A practical solution to the implementation of a voting booth”, Advances in Cryptology—EUROCRYPT ’95 Proceedings, (Springer-Verlag, 1995), pp. 393-403. [6] H. Ven and W. Jan, “Verifiable Internet Voting in Estonia”, Proceedings of 2014 International Conference on Electronic Voting EVOTE 2014, (E-Voting.CC GmbH, 2014), pp. 1-7. [7] P. Deniel and A. S. Dan, “A Hybrid Mobile Biometric-Based E-Voting System”,Proc. of the 9th International Symposium on Advanced Topics in Electrical Engineering, May 7-9, 2015, (Bucharest, Romania, IEEE, 2015), pp. 37-42. [8] K. Adel, G. Yasmin, S. Dima, M. Dalya and Shastry P.V.S, “M-Vote: A Reliable and Highly Secure Mobile Voting System”,Proc. of 2013 Palestinian International Conference on Information and Communication Technology, (IEEE, 2013), pp. 90-98. [9] K. A. Hussein , S. I. Mohammad and M. D. Omar, “Secure Internet Voting System based on Public Key Kerberos” , Proceedings of IJCSI International Journal of Computer Science Issues, (Vol. 9, Issue 2, No 3, 2012), pp. 428-434. [10] U. Mohib, I. U. Arif, Noor ul Amin and Nizamuddin, “An Efficient and Secure Mobile Phone Voting System”, (IEEE, 2013), pp. 332-336.