SlideShare a Scribd company logo
H o m o m o r p h i c E n c r y p t i o n - P a g e 1 | 19
AKENTEN APPIAH- MENKA UNIVERSITY OF SKILL TRAINING AND
ENTREPRENEURIAL DEVELOPMENT
APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN
ELECTRONIC VOTING SYSTEM
BY
PRINCE DUAH MENSAH
MIT 821 INFORMATION SECURITY
H o m o m o r p h i c E n c r y p t i o n - P a g e 2 | 19
ABSTRACT
The main dominant force to democratic governance is elections. Elections enable voters to
choose leaders and to hold them answerable for their performance in office and reinforce
the stability and legitimacy of the political community. The electoral process becomes
challenging for individuals who cannot visit the polling stall for casting their votes. With
the integration of data innovation, electronic voting system framework is all the more
intriguing and too helpful for ensuring mass participation in the elections as people have
the priviledge to vote anywhere. Nevertheless, security bridges stand as the main worry for
using electronic voting system. Electronic voting system has been proven to be exploited
by simulated hack attacks. The proposed authentication algorithm guarantees security
prerequisites and solves the deficiencies in the RSA and Message Digest Method 5
Algorithm. The system can compute the sum of votes in ciphertext form without revealing
the choice of the voters using its homomorphic property. The resulting ciphertext form
without revealing the choice of the voters. The resultant ciphertext values will not be the
same even though the same plaintext is encrypted, with a size of 4 times larger than the
plaintext size. The success ratio for the system is 100% with the maximum number of
messages that can be processed is 3.287.937.778 messages. Therefore, the proposed
authentication algorithm for electronic voting system is effective, robust and simple and
provide users with availability, confidentiality and integrity than the RSA and MD 5
algorithms.
H o m o m o r p h i c E n c r y p t i o n - P a g e 3 | 19
CHAPTER ONE
INTRODUCTION
Elections are expected to free and free because it is the back bone of a democracy. Elections
are a standardized process by which adult citizens cast votes and elect leaders and members
to different government positions. Elections provide us with a peaceful transition of power
from one form of government to another; people may always nominate a party to form
government if they are dissatisfied with the current government, its policies and the way
its operates. The way to select representatives or leaders is by voting. In traditional voting
system, voters have to reach polling station and cast their votes and this is sometimes
difficult for the aged and the people who are living far from their home and voting centers.
Voting through the internet therefore allows voters to give their votes to their
representatives from anywhere as it ensures efficient and secured way of casting and
calculating the votes.
Electronic voting is often seen as a tool for making the electoral process more efficient and
for increasing trust in its management. Properly implemented, e-voting solutions can
increase the security of the ballot, speed up the processing of results and make voting
easier. Electronic voting system is associated with the strength of faster vote count and
tabulation, more accurate results as human error is excluded, efficient handling of
complicated electoral systems formulae that require laborious counting procedures,
improved presentation of complicated ballot papers, increased convenience for voters and
prevention of fraud in polling stations and during the transmission and tabulation of results
by reducing human intervention. Nevertheless, there are some loopholes associated with
the electronic voting system which includes lack of transparency, risk of manipulation by
insiders with privileged access to the system or by hackers from outside. If not carefully
planned and designed, especially with its security concerns, electronic voting can
undermine the confidence in the whole electoral process. Therefore, our proposal uses
H o m o m o r p h i c E n c r y p t i o n - P a g e 4 | 19
Homomorphic encryption to overcome these security issues and ensure the effectiveness
and efficiency of the electronic voting system.
1.2 Purpose of the Study
The main purpose of the article is to propose an authentication protocol, namely
Homomorphic encryption to address the deficiencies in the RSA and MD 5 algorithm in
securing an electronic voting system. The article specifically looks at:
i. Application of the Homomorphic Encryption
ii. Attack or collision resistance of Homomorphic Encryption
iii. The performance and time complexity of Homomorphic Encryption
H o m o m o r p h i c E n c r y p t i o n - P a g e 5 | 19
CHAPTER TWO
LITERATURE REVIEW
The literature review involves identifying gaps in the literature and seeking new lines of
inquiry with regards to the topic. The literature review encompasses electronic voting
system, homomorphic encryption and its properties with palier cryptosystem.
2.1 Electronic Voting System
Electronic Voting System, also known as e- voting, is voting that uses electronic means to
either aid or take care of casting and counting ballots. Depending on the particular
implementation, electronic voting may use standalone electronic voting machines (EVM)
or computers connected to the internet (online voting).
Electronic Voting may encompass a range of internet services, from basic transmission of
tabulated results to full- function online voting through common connectable household
devices. The degree of automation may be limited to marking a paper ballot, or may be a
comprehensive system of vote input, vote recording, data encryption and transmission to
servers and consolidation and tabulation of election results.
A worthy electronic voting system must perform most of these tasks while complying with
a set of standards established by regulatory bodies, and must also be capable to deal
successfully with strong requirements associated with security, accuracy, integrity,
swiftness, privacy, auditability, accessibility, cost- effectiveness, scalability and ecological
sustainability
H o m o m o r p h i c E n c r y p t i o n - P a g e 6 | 19
2.2 Homomorphic Encryption
R. Rivest, M. Dertouzos and Leo. Adleman presented the idea of Homomorphic
cryptosystem, long after the development of RSA. Homomorphic encryption is a type of
encryption method that allows computations to be performed on encrypted data without
decrypting it. The results of the computations are also encrypted and can only be revealed
by the owner of the secret key. It enables one to operate on encrypted data
Let E be an encryption function used to encrypt plaintext, x as plaintext and f() as operation
to implement , So homomorphic encryption is defined as :
f(E(x1), E(x2) ....E(xn)) = E(f(x1,x2....xn)) Additive Homomorphism :
Binary operation is denoted by +, so additive homomorphic is described as
E(x2) + E(x1) = E (x2 + x1)
Pallier Cryptography supports additive homomorphic property
2.3 Types of Homomorphic Encryption
Homomorphic encryption comes in different types and they include:
i. Partially Homomorphic Encryption (PHE): PHE only allows selected
mathematical functions to be performed on encrypted data.
ii. Somewhat Homomorphic Encryption (SHE): SHE allows a limited number of
mathematical operations up to a certain complexity to be performed, for a limited
number of times.
iii. Fully Homomorphic Encryption (FHE): FHE allows any kind of mathematical
operation to be performed for an unlimited number of times.
H o m o m o r p h i c E n c r y p t i o n - P a g e 7 | 19
2.4 Advantages of Homomorphic Encryption
i. Establishing a higher standard of data security
ii. Analyzing data without infringing on users’ privacy
iii. Generating measurable economic benefits by allowing big data analytics
on encrypted data while maintaining privacy and compliance controls
iv. Processing encrypted data in public and private clouds and third-party
environments while maintaining confidentiality controls
v. Allowing secure and efficient cloud use
2.5 Disadvantages of Homomorphic Encryption
i. Computationally expensive, as it introduces significant overheads compared to
performing the operations on non-encrypted data.
ii. Homomorphic encryption requires either application modifications or dedicated
and specialized client-server applications in order to make it work functionally.
2.6 Paillier Cryptosystem
One of the well- known schemes for homomorphic cryptography is Paillier. It was invented
by Pascal Paillier in 1999. It can encrypt many bits in single operation with a constant
factor of expansion and also an efficient decryption. Pallier cryptosystem is defined by four
terms: key generation, encryption, decryption and homomorphic operation.
H o m o m o r p h i c E n c r y p t i o n - P a g e 8 | 19
CHAPTER THREE
METHODOLOGY
The methodology comprises of the specific procedures or techniques used to identify,
select, process and analyze information about the homomorphic encryption. It further
discusses the various methods that makes the Homomorphic Encryption an efficient choice
over the other algorithms, including the sources of data collection, Homomorphic
Encryption Design Architecture and Research Instruments.
3.1 Sources of Data Collection
Information for this report was sourced from various secondary sources, all listed in the
reference list. Data from publications by International Journal of Applied Engineering
Research ISSN 0973-4562 Volume 13, Number 11 (2018) also proved valuable. This
report is not comprehensive analysis of the available literature but provides a broad
overview of the algorithm.
3.2 Stages in the Electronic Voting System using Homomorphic Encryption
In today’s competitive world, most of a lot of things are created on online platform.
Similarly, in internet voting system, people can cast their votes without visiting the election
booth. Internet voting system utilizes homomorphic encryption to count votes. The final
outcome is taken from encrypted collection of votes without decrypting them. So it remains
unknown who voted for whom. In this system, integrity and anonymity of the voter remains
hidden.
The voter should have to create their own account on this portal by verified government
documents. The several stages for online voting system are given below.
H o m o m o r p h i c E n c r y p t i o n - P a g e 9 | 19
Figure 1: A Flow Diagram
3.2.1 Registration stage
In this stage we can add new voter in electronic voting system by authenticating
voter through Election authority. The eligibility of the individual voter is verified by
collecting required details about them. User will enter their basic details and will add
their voter id which will be crossed checked with the electoral commission database.
After successful registration, user will able to cast a vote through electronic voting
system.
H o m o m o r p h i c E n c r y p t i o n - P a g e 10 | 19
3.2.2Authentication stage
This stage comes after registration stage. In this stage, user will authenticate themselves
using login id (which will be their voter id) and password that was set by the user in
registration phase. Thus using user id and password users can get uniquely authenticated.
3.2.3Voting stage
In this stage voter can give their vote. They can give vote to their selected candidate. The
vote given by voters to their selected candidates are then encrypted using Paillier
encryption. The encrypted votes are stored in database which will be then tallied in tally
stage.
3.2.4 Calculation stage
In this phase Votes that are stored in encrypted (using homomorphic encryption) form in
database are added to get total no of votes received by the respective parties. Consider we
have two numbers 10 and 20, we have to perform the addition on encrypted numbers using
pailliar algorithm.
3.4 Diagram of Homomorphic Encryption Scheme
A widely esteemed application of homomorphic encryption schemes is cloud computing.
Presently, the need for cloud computing is increasing fast, as the data we are processing
and computing on is getting bigger and bigger every day, with the effect that a single
person’s computation power does not suffice anymore. Hence, it is favorable to use
someone else’s power without losing the privacy we seek.
Say, Alice wants to store a sensitive file m ∈ {0, 1} n on Bob’s server. So she sends Bob
Enc(m1), ..., Enc(mn). Assume that the file is a database (a list of people with specific
information about them) and Alice wants to find out how many of them are 25 years old.
Instead of retrieving the data from Bob, decrypting it and searching for the wanted
H o m o m o r p h i c E n c r y p t i o n - P a g e 11 | 19
information, she will ask Bob to do the computations, without him knowing what or who
he is computing on. The answer from Bob comes in form of a ciphertext which only she
can decrypt with her secret key.
3.4 Research Instruments
Research instruments are tools used for data collection and analysis of the study. The
following tools were used in analyzing RSA Algorithm: flow chart, pseudocode and python
(programming language).
3.4.1 Flow Chart
A flowchart is a generic tool that is used to separate steps of a process in sequential order.
It has been adapted for a wide variety of purposes and can be used to describe various
processes.
3.4.2 Pseudocode
Pseudocode is meant only as a tool to help expedite the development process and defining
all inputs, outputs and interactions needed to effectively solve a problem. It should not add
another layer of complexity to the process.
3.4.3 Python
Python is the most efficient cross- platform tool, specifically programming language used
for artificial intelligence and machine learning solutions.
H o m o m o r p h i c E n c r y p t i o n - P a g e 12 | 19
CHAPTER FOUR
RESULTS AND DISCUSSION
This section of the article presents the findings of the study whose main purpose is to
propose a novel authentication algorithm to resolve the deficiencies in RSA and Message
Digest Method 5. The presentation of findings aligns with the objectives of the article of
the proposed Homomorphic encryption.
Analyzing Algorithm means to study the specification of the Algorithm and come to a
conclusion about how the implementation of that algorithm will perform in general. Here,
the amount of resources necessary to execute the algorithm is determined and its equivalent
running time (time complexity) or efficiency of the algorithm.
4.1 Application of the Electronic Voting System Using the Homomorphic Encryption
Algorithm
Based on the stages of the electronic voting system, users would have to follow strict
instructions to be able to cast their votes successfully as discussed in chapter 3. Here, we
shall consider the process a user must go through to cast his or her vote.
In the first place, voter will register themselves on the portal by giving some basic details
as their Full name, password, voter id, gender and region. After, fill the details user’s voter
id will be authenticated with government database of voter id.
Figure 4.1: Registration Form
H o m o m o r p h i c E n c r y p t i o n - P a g e 13 | 19
After successful registration stage, user can login with their voter id as username and
password that is set by them. Thus, voters will be authenticated uniquely with the
combination of voter id and password.
Figure 4.2: Homepage Figure 4.3: Login Page
This is where voters will cast their votes to choose their choice of candidate. Candidates
are denoted using the party’s symbol. Voter just needs to tap on the button indicated below
the party’s symbol.
Figure 4.4: Voting Page Figure 4.5: Polling Result
In existing system, Voter cast their votes online through electronic voting system and the
vote is stored in encrypted form using Paillier algorithm. The ballots are shuffled and apply
the rotational method on votes for storing votes in database which increase the time and
H o m o m o r p h i c E n c r y p t i o n - P a g e 14 | 19
space complexity so the overall cost of the system will not increase. The proposed system
allows voters to cast the votes and store it in encrypted form using Paillier cryptosystem
form maintaining the integrity of data. When vote casted for specific candidate, votes of
that candidate are stored in encrypted form and null value is in encrypted form
automatically set to the remaining candidates in database. This will provide more security
as the vote in encrypted form is updated in database for all candidates.
The attacker as well as the administrator or the employees who have access to the database
will not be able to distinguish between the ballot stored for the candidate is a vote cast by
the voter or a null value. The final county of votes for each candidate is calculated using
homomorpnic addition property of Paillier cryptosystem. The proposed system is faster
and provide more security as all votes are stored in encrypted form and this will help in
maintaining the three traids of the cybersecurity and thus, availability, confidentiality, and
integrity of the system.
4.2: Collision Resistance of Homomorphic Encryption
The figure below shows the security performance or collision resistance of homomorphic
encryption with Paillier algorithm.
Figure 4.6: Security Performance of Homomorphic Encryption
H o m o m o r p h i c E n c r y p t i o n - P a g e 15 | 19
From the above table, it can be indicated that the security performance with regards to the
key size increases with asymmetric encryption and decreases with symmetric encryption.
This shows that homomorphic encryption with paillier algorithm are semantically secure
and strong against collision resistance.
4.3 Performance and time complexity of Homomorphic Encryption
The performance, efficiency and time complexity of the above encryption algorithm is
calculated using the size of the key, given in bits as against time, also given in ms.
Figure 4.7: Encryption time for Paillier and Elgamal
H o m o m o r p h i c E n c r y p t i o n - P a g e 16 | 19
Table 4.1: Encryption time for Paillier Algorithm
The above table shows a rise in the encryption time as the length of the key increases. So
the combination of homomorphic encryption using Paillier cryptosystem can significantly
improve the storage and processing performance in the electronic voting scheme.
Therefore, homomorphic encryption can be considered much faster than many other
algorithms.
H o m o m o r p h i c E n c r y p t i o n - P a g e 17 | 19
CHAPTER FIVE
SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS
The purpose of this article was to propose authentication algorithm to resolve the
deficiencies in RSA and Message Digest Method 5 Algorithms. This section presents the
summary of the major findings from the analyses of data, and then, make recommendations
and conclusion.
5.1 Summary of Major Findings
In the first place, it was revealed that the application of the electronic voting system using
homomorphic encryption undergoes four processes which includes registration stage,
authentication stage, voting stage and calculation stage where we get to know the results
of the election.
Secondly, the study indicated that the security performance with regards to the key size
increases with asymmetric encryption and decreases with symmetric encryption. This
shows that homomorphic encryption with paillier algorithm are semantically secure and
strong against collision resistance.
Furthermore, the study shows that the combination of homomorphic encryption using
Paillier cryptosystem can significantly improve the storage and processing performance in
the electronic voting scheme. Therefore, homomorphic encryption can be considered much
faster than many other algorithms.
5.2 Recommendation
Based on the various findings, I will recommend the proposed Homomorphic Paillier
Algorithm as an authentication encryption for electronic voting system rather than RSA
and MD 5.
H o m o m o r p h i c E n c r y p t i o n - P a g e 18 | 19
5.3 Conclusion
Voting through the internet has attracted many people specifically people living far from
their homes than traditional system of voting. From past few years, a lot of researchers
have started seeking interest in this field due to transparency and security concern. This
research paper describes the internet voting system using Paillier algorithm and its
homomorphic characteristics. This system gives assurance of data confidentiality and data
integrity in which it will use homomorphic properties for calculation of votes in the
encrypted form and then decrypting them to get it totally secure.
The homomorphic encryption algorithm is semantically secure, stronger collision
resistance and much faster processing performance than RSA and MD 5.
H o m o m o r p h i c E n c r y p t i o n - P a g e 19 | 19
References
SalaviR.R.,MathM.M.,KulkarniU.P.(2019)ASurveyofVariousCryptographicTechniques:F
romTraditionalCryptographytoFullyHomomorphicEncryption.In:SainiH.,SayalR.,Govard
hanA.,BuyyaR.(eds)InnovationsinComputerScienceandEngineering.LectureNotesinNetw
orksandSystems,vol74.Springer,Singapore
K.K.Chauhan,A.K.S.SangerandA.Verma,"HomomorphicEncryptionforDataSecurityinClo
udComputing,"2015InternationalConferenceonInformationTechnology(ICIT),Bhubanesw
ar,2015,pp.206-209.
M.Nassar,A.ErradiandQ.M.Malluhi,"Paillier’sencryption:Implementationandcloudapplic
ations,"2015InternationalConferenceonAppliedResearchinComputerScienceandEngineeri
ng(ICAR),Beirut,2015,pp.1-5.[4]Shihab,TLiji
C.Gentryetal.,“Fullyhomomorphicencryptionusingideallattices.”.inSTOC,vol.9,2009,pp.
169–178.
Z.Brakerski,C.Gentry,andV.Vaikuntanathan,“(leveled)fullyhomomorphicencryptionwitho
utbootstrapping,”.inProceedingsofthe3rdInnovationsinTheoreticalComputerScienceConf
erence.ACM,2012,pp.309–325.
A.Acar,H.Aksu,A.S.Uluagac,andM.Conti,“Asurveyonhomomorphicencryptionschemes:T
heoryandimplementation,”.ACMComput.Surv.,vol.51,pp.79:1–79:35,July2018.

More Related Content

What's hot

E learning management system
E learning management systemE learning management system
E learning management system
chrt222
 
University management system UMS
University management system UMSUniversity management system UMS
University management system UMS
Mayank Jain
 
Online examination ppt
Online examination pptOnline examination ppt
Online examination ppt
Amit Kumar
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity Management
Gigya
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
Anoop Kumar
 
Report online voting system
Report online voting systemReport online voting system
Report online voting system
Deepak tandan
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12
Traitet Thepbandansuk
 
Context Level DFD
Context Level DFDContext Level DFD
Context Level DFD
Syed Farjad Zia Zaidi
 
Election managment
Election managmentElection managment
Election managment
chikkujacob
 
Moodle: An Open Source Course Management System
Moodle: An Open Source Course Management SystemMoodle: An Open Source Course Management System
Moodle: An Open Source Course Management System
Office of Instructional Development at Dawson College
 
Online examination system project ppt
Online examination system project pptOnline examination system project ppt
Online examination system project ppt
Mohit Gupta
 
E learning - Knowledge And Curriculum
E learning - Knowledge And CurriculumE learning - Knowledge And Curriculum
E learning - Knowledge And Curriculum
Mamatha73
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
abadmgr
 
AN UNDERGRADUATE PROJECT PROPOSAL ON
AN UNDERGRADUATE PROJECT PROPOSAL ONAN UNDERGRADUATE PROJECT PROPOSAL ON
AN UNDERGRADUATE PROJECT PROPOSAL ONStephen Enunwah
 
Web 3.0 - A Detailed Guide
Web 3.0 - A Detailed GuideWeb 3.0 - A Detailed Guide
Web 3.0 - A Detailed Guide
101 Blockchains
 
Joomla Introduction & Installation Tutorial
Joomla Introduction & Installation TutorialJoomla Introduction & Installation Tutorial
Joomla Introduction & Installation Tutorial
Singsys Pte Ltd
 
Leaning Management System and Moodle
Leaning Management System and MoodleLeaning Management System and Moodle
Leaning Management System and Moodle
Suresh Babu
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
Doug Allen
 

What's hot (20)

E learning management system
E learning management systemE learning management system
E learning management system
 
University management system UMS
University management system UMSUniversity management system UMS
University management system UMS
 
Online examination ppt
Online examination pptOnline examination ppt
Online examination ppt
 
Onine exam
Onine examOnine exam
Onine exam
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity Management
 
Online voting system ppt by anoop
Online voting system ppt by anoopOnline voting system ppt by anoop
Online voting system ppt by anoop
 
Report online voting system
Report online voting systemReport online voting system
Report online voting system
 
11 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may1211 e voting-proposal_it_project_management10may12
11 e voting-proposal_it_project_management10may12
 
Context Level DFD
Context Level DFDContext Level DFD
Context Level DFD
 
Election managment
Election managmentElection managment
Election managment
 
Moodle: An Open Source Course Management System
Moodle: An Open Source Course Management SystemMoodle: An Open Source Course Management System
Moodle: An Open Source Course Management System
 
Online examination system project ppt
Online examination system project pptOnline examination system project ppt
Online examination system project ppt
 
E learning - Knowledge And Curriculum
E learning - Knowledge And CurriculumE learning - Knowledge And Curriculum
E learning - Knowledge And Curriculum
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
 
AN UNDERGRADUATE PROJECT PROPOSAL ON
AN UNDERGRADUATE PROJECT PROPOSAL ONAN UNDERGRADUATE PROJECT PROPOSAL ON
AN UNDERGRADUATE PROJECT PROPOSAL ON
 
Web 3.0 - A Detailed Guide
Web 3.0 - A Detailed GuideWeb 3.0 - A Detailed Guide
Web 3.0 - A Detailed Guide
 
Joomla Introduction & Installation Tutorial
Joomla Introduction & Installation TutorialJoomla Introduction & Installation Tutorial
Joomla Introduction & Installation Tutorial
 
Leaning Management System and Moodle
Leaning Management System and MoodleLeaning Management System and Moodle
Leaning Management System and Moodle
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
State elearning proposal
State elearning proposalState elearning proposal
State elearning proposal
 

Similar to APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM

Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
O017658697
O017658697O017658697
O017658697
IOSR Journals
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
iosrjce
 
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
SIR SUCCESS PRINCE DUAH DUAH
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYE-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
IJNSA Journal
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for Libya
CSITiaesprime
 
F017513138
F017513138F017513138
F017513138
IOSR Journals
 
Online e voting
Online e votingOnline e voting
Online e voting
MerbinJose
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET Journal
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
IRJET Journal
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
smeetramteke
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET Journal
 
E-voting system with blockchain
E-voting system with blockchainE-voting system with blockchain
E-voting system with blockchain
yashgupta9121
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
SantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
AbbyWhyte974
 
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
abdallah76803
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
CSCJournals
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
Associate Professor in VSB Coimbatore
 

Similar to APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM (20)

Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
O017658697
O017658697O017658697
O017658697
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYE-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for Libya
 
F017513138
F017513138F017513138
F017513138
 
Online e voting
Online e votingOnline e voting
Online e voting
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
E-voting system with blockchain
E-voting system with blockchainE-voting system with blockchain
E-voting system with blockchain
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 

More from SIR SUCCESS PRINCE DUAH DUAH

A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
SIR SUCCESS PRINCE DUAH DUAH
 
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SIR SUCCESS PRINCE DUAH DUAH
 
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdfCURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
SIR SUCCESS PRINCE DUAH DUAH
 
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
SIR SUCCESS PRINCE DUAH DUAH
 
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
SIR SUCCESS PRINCE DUAH DUAH
 
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdfHAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
SIR SUCCESS PRINCE DUAH DUAH
 
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
SIR SUCCESS PRINCE DUAH DUAH
 
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
SIR SUCCESS PRINCE DUAH DUAH
 
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdfHAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
SIR SUCCESS PRINCE DUAH DUAH
 
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
SIR SUCCESS PRINCE DUAH DUAH
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
SIR SUCCESS PRINCE DUAH DUAH
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
SIR SUCCESS PRINCE DUAH DUAH
 
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdfNOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
SIR SUCCESS PRINCE DUAH DUAH
 
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
SIR SUCCESS PRINCE DUAH DUAH
 
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
SIR SUCCESS PRINCE DUAH DUAH
 
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
SIR SUCCESS PRINCE DUAH DUAH
 
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdfPUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
SIR SUCCESS PRINCE DUAH DUAH
 
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
SIR SUCCESS PRINCE DUAH DUAH
 
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
SIR SUCCESS PRINCE DUAH DUAH
 
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
SIR SUCCESS PRINCE DUAH DUAH
 

More from SIR SUCCESS PRINCE DUAH DUAH (20)

A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
 
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
 
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdfCURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
 
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
 
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
 
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdfHAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
 
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
 
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
 
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdfHAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
 
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
 
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdfNOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
 
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
 
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
 
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
 
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdfPUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
 
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
 
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
 
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM

  • 1. H o m o m o r p h i c E n c r y p t i o n - P a g e 1 | 19 AKENTEN APPIAH- MENKA UNIVERSITY OF SKILL TRAINING AND ENTREPRENEURIAL DEVELOPMENT APPLICATION OF HOMOMORPHIC ENCRYPTION ALGORITHM IN ELECTRONIC VOTING SYSTEM BY PRINCE DUAH MENSAH MIT 821 INFORMATION SECURITY
  • 2. H o m o m o r p h i c E n c r y p t i o n - P a g e 2 | 19 ABSTRACT The main dominant force to democratic governance is elections. Elections enable voters to choose leaders and to hold them answerable for their performance in office and reinforce the stability and legitimacy of the political community. The electoral process becomes challenging for individuals who cannot visit the polling stall for casting their votes. With the integration of data innovation, electronic voting system framework is all the more intriguing and too helpful for ensuring mass participation in the elections as people have the priviledge to vote anywhere. Nevertheless, security bridges stand as the main worry for using electronic voting system. Electronic voting system has been proven to be exploited by simulated hack attacks. The proposed authentication algorithm guarantees security prerequisites and solves the deficiencies in the RSA and Message Digest Method 5 Algorithm. The system can compute the sum of votes in ciphertext form without revealing the choice of the voters using its homomorphic property. The resulting ciphertext form without revealing the choice of the voters. The resultant ciphertext values will not be the same even though the same plaintext is encrypted, with a size of 4 times larger than the plaintext size. The success ratio for the system is 100% with the maximum number of messages that can be processed is 3.287.937.778 messages. Therefore, the proposed authentication algorithm for electronic voting system is effective, robust and simple and provide users with availability, confidentiality and integrity than the RSA and MD 5 algorithms.
  • 3. H o m o m o r p h i c E n c r y p t i o n - P a g e 3 | 19 CHAPTER ONE INTRODUCTION Elections are expected to free and free because it is the back bone of a democracy. Elections are a standardized process by which adult citizens cast votes and elect leaders and members to different government positions. Elections provide us with a peaceful transition of power from one form of government to another; people may always nominate a party to form government if they are dissatisfied with the current government, its policies and the way its operates. The way to select representatives or leaders is by voting. In traditional voting system, voters have to reach polling station and cast their votes and this is sometimes difficult for the aged and the people who are living far from their home and voting centers. Voting through the internet therefore allows voters to give their votes to their representatives from anywhere as it ensures efficient and secured way of casting and calculating the votes. Electronic voting is often seen as a tool for making the electoral process more efficient and for increasing trust in its management. Properly implemented, e-voting solutions can increase the security of the ballot, speed up the processing of results and make voting easier. Electronic voting system is associated with the strength of faster vote count and tabulation, more accurate results as human error is excluded, efficient handling of complicated electoral systems formulae that require laborious counting procedures, improved presentation of complicated ballot papers, increased convenience for voters and prevention of fraud in polling stations and during the transmission and tabulation of results by reducing human intervention. Nevertheless, there are some loopholes associated with the electronic voting system which includes lack of transparency, risk of manipulation by insiders with privileged access to the system or by hackers from outside. If not carefully planned and designed, especially with its security concerns, electronic voting can undermine the confidence in the whole electoral process. Therefore, our proposal uses
  • 4. H o m o m o r p h i c E n c r y p t i o n - P a g e 4 | 19 Homomorphic encryption to overcome these security issues and ensure the effectiveness and efficiency of the electronic voting system. 1.2 Purpose of the Study The main purpose of the article is to propose an authentication protocol, namely Homomorphic encryption to address the deficiencies in the RSA and MD 5 algorithm in securing an electronic voting system. The article specifically looks at: i. Application of the Homomorphic Encryption ii. Attack or collision resistance of Homomorphic Encryption iii. The performance and time complexity of Homomorphic Encryption
  • 5. H o m o m o r p h i c E n c r y p t i o n - P a g e 5 | 19 CHAPTER TWO LITERATURE REVIEW The literature review involves identifying gaps in the literature and seeking new lines of inquiry with regards to the topic. The literature review encompasses electronic voting system, homomorphic encryption and its properties with palier cryptosystem. 2.1 Electronic Voting System Electronic Voting System, also known as e- voting, is voting that uses electronic means to either aid or take care of casting and counting ballots. Depending on the particular implementation, electronic voting may use standalone electronic voting machines (EVM) or computers connected to the internet (online voting). Electronic Voting may encompass a range of internet services, from basic transmission of tabulated results to full- function online voting through common connectable household devices. The degree of automation may be limited to marking a paper ballot, or may be a comprehensive system of vote input, vote recording, data encryption and transmission to servers and consolidation and tabulation of election results. A worthy electronic voting system must perform most of these tasks while complying with a set of standards established by regulatory bodies, and must also be capable to deal successfully with strong requirements associated with security, accuracy, integrity, swiftness, privacy, auditability, accessibility, cost- effectiveness, scalability and ecological sustainability
  • 6. H o m o m o r p h i c E n c r y p t i o n - P a g e 6 | 19 2.2 Homomorphic Encryption R. Rivest, M. Dertouzos and Leo. Adleman presented the idea of Homomorphic cryptosystem, long after the development of RSA. Homomorphic encryption is a type of encryption method that allows computations to be performed on encrypted data without decrypting it. The results of the computations are also encrypted and can only be revealed by the owner of the secret key. It enables one to operate on encrypted data Let E be an encryption function used to encrypt plaintext, x as plaintext and f() as operation to implement , So homomorphic encryption is defined as : f(E(x1), E(x2) ....E(xn)) = E(f(x1,x2....xn)) Additive Homomorphism : Binary operation is denoted by +, so additive homomorphic is described as E(x2) + E(x1) = E (x2 + x1) Pallier Cryptography supports additive homomorphic property 2.3 Types of Homomorphic Encryption Homomorphic encryption comes in different types and they include: i. Partially Homomorphic Encryption (PHE): PHE only allows selected mathematical functions to be performed on encrypted data. ii. Somewhat Homomorphic Encryption (SHE): SHE allows a limited number of mathematical operations up to a certain complexity to be performed, for a limited number of times. iii. Fully Homomorphic Encryption (FHE): FHE allows any kind of mathematical operation to be performed for an unlimited number of times.
  • 7. H o m o m o r p h i c E n c r y p t i o n - P a g e 7 | 19 2.4 Advantages of Homomorphic Encryption i. Establishing a higher standard of data security ii. Analyzing data without infringing on users’ privacy iii. Generating measurable economic benefits by allowing big data analytics on encrypted data while maintaining privacy and compliance controls iv. Processing encrypted data in public and private clouds and third-party environments while maintaining confidentiality controls v. Allowing secure and efficient cloud use 2.5 Disadvantages of Homomorphic Encryption i. Computationally expensive, as it introduces significant overheads compared to performing the operations on non-encrypted data. ii. Homomorphic encryption requires either application modifications or dedicated and specialized client-server applications in order to make it work functionally. 2.6 Paillier Cryptosystem One of the well- known schemes for homomorphic cryptography is Paillier. It was invented by Pascal Paillier in 1999. It can encrypt many bits in single operation with a constant factor of expansion and also an efficient decryption. Pallier cryptosystem is defined by four terms: key generation, encryption, decryption and homomorphic operation.
  • 8. H o m o m o r p h i c E n c r y p t i o n - P a g e 8 | 19 CHAPTER THREE METHODOLOGY The methodology comprises of the specific procedures or techniques used to identify, select, process and analyze information about the homomorphic encryption. It further discusses the various methods that makes the Homomorphic Encryption an efficient choice over the other algorithms, including the sources of data collection, Homomorphic Encryption Design Architecture and Research Instruments. 3.1 Sources of Data Collection Information for this report was sourced from various secondary sources, all listed in the reference list. Data from publications by International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 11 (2018) also proved valuable. This report is not comprehensive analysis of the available literature but provides a broad overview of the algorithm. 3.2 Stages in the Electronic Voting System using Homomorphic Encryption In today’s competitive world, most of a lot of things are created on online platform. Similarly, in internet voting system, people can cast their votes without visiting the election booth. Internet voting system utilizes homomorphic encryption to count votes. The final outcome is taken from encrypted collection of votes without decrypting them. So it remains unknown who voted for whom. In this system, integrity and anonymity of the voter remains hidden. The voter should have to create their own account on this portal by verified government documents. The several stages for online voting system are given below.
  • 9. H o m o m o r p h i c E n c r y p t i o n - P a g e 9 | 19 Figure 1: A Flow Diagram 3.2.1 Registration stage In this stage we can add new voter in electronic voting system by authenticating voter through Election authority. The eligibility of the individual voter is verified by collecting required details about them. User will enter their basic details and will add their voter id which will be crossed checked with the electoral commission database. After successful registration, user will able to cast a vote through electronic voting system.
  • 10. H o m o m o r p h i c E n c r y p t i o n - P a g e 10 | 19 3.2.2Authentication stage This stage comes after registration stage. In this stage, user will authenticate themselves using login id (which will be their voter id) and password that was set by the user in registration phase. Thus using user id and password users can get uniquely authenticated. 3.2.3Voting stage In this stage voter can give their vote. They can give vote to their selected candidate. The vote given by voters to their selected candidates are then encrypted using Paillier encryption. The encrypted votes are stored in database which will be then tallied in tally stage. 3.2.4 Calculation stage In this phase Votes that are stored in encrypted (using homomorphic encryption) form in database are added to get total no of votes received by the respective parties. Consider we have two numbers 10 and 20, we have to perform the addition on encrypted numbers using pailliar algorithm. 3.4 Diagram of Homomorphic Encryption Scheme A widely esteemed application of homomorphic encryption schemes is cloud computing. Presently, the need for cloud computing is increasing fast, as the data we are processing and computing on is getting bigger and bigger every day, with the effect that a single person’s computation power does not suffice anymore. Hence, it is favorable to use someone else’s power without losing the privacy we seek. Say, Alice wants to store a sensitive file m ∈ {0, 1} n on Bob’s server. So she sends Bob Enc(m1), ..., Enc(mn). Assume that the file is a database (a list of people with specific information about them) and Alice wants to find out how many of them are 25 years old. Instead of retrieving the data from Bob, decrypting it and searching for the wanted
  • 11. H o m o m o r p h i c E n c r y p t i o n - P a g e 11 | 19 information, she will ask Bob to do the computations, without him knowing what or who he is computing on. The answer from Bob comes in form of a ciphertext which only she can decrypt with her secret key. 3.4 Research Instruments Research instruments are tools used for data collection and analysis of the study. The following tools were used in analyzing RSA Algorithm: flow chart, pseudocode and python (programming language). 3.4.1 Flow Chart A flowchart is a generic tool that is used to separate steps of a process in sequential order. It has been adapted for a wide variety of purposes and can be used to describe various processes. 3.4.2 Pseudocode Pseudocode is meant only as a tool to help expedite the development process and defining all inputs, outputs and interactions needed to effectively solve a problem. It should not add another layer of complexity to the process. 3.4.3 Python Python is the most efficient cross- platform tool, specifically programming language used for artificial intelligence and machine learning solutions.
  • 12. H o m o m o r p h i c E n c r y p t i o n - P a g e 12 | 19 CHAPTER FOUR RESULTS AND DISCUSSION This section of the article presents the findings of the study whose main purpose is to propose a novel authentication algorithm to resolve the deficiencies in RSA and Message Digest Method 5. The presentation of findings aligns with the objectives of the article of the proposed Homomorphic encryption. Analyzing Algorithm means to study the specification of the Algorithm and come to a conclusion about how the implementation of that algorithm will perform in general. Here, the amount of resources necessary to execute the algorithm is determined and its equivalent running time (time complexity) or efficiency of the algorithm. 4.1 Application of the Electronic Voting System Using the Homomorphic Encryption Algorithm Based on the stages of the electronic voting system, users would have to follow strict instructions to be able to cast their votes successfully as discussed in chapter 3. Here, we shall consider the process a user must go through to cast his or her vote. In the first place, voter will register themselves on the portal by giving some basic details as their Full name, password, voter id, gender and region. After, fill the details user’s voter id will be authenticated with government database of voter id. Figure 4.1: Registration Form
  • 13. H o m o m o r p h i c E n c r y p t i o n - P a g e 13 | 19 After successful registration stage, user can login with their voter id as username and password that is set by them. Thus, voters will be authenticated uniquely with the combination of voter id and password. Figure 4.2: Homepage Figure 4.3: Login Page This is where voters will cast their votes to choose their choice of candidate. Candidates are denoted using the party’s symbol. Voter just needs to tap on the button indicated below the party’s symbol. Figure 4.4: Voting Page Figure 4.5: Polling Result In existing system, Voter cast their votes online through electronic voting system and the vote is stored in encrypted form using Paillier algorithm. The ballots are shuffled and apply the rotational method on votes for storing votes in database which increase the time and
  • 14. H o m o m o r p h i c E n c r y p t i o n - P a g e 14 | 19 space complexity so the overall cost of the system will not increase. The proposed system allows voters to cast the votes and store it in encrypted form using Paillier cryptosystem form maintaining the integrity of data. When vote casted for specific candidate, votes of that candidate are stored in encrypted form and null value is in encrypted form automatically set to the remaining candidates in database. This will provide more security as the vote in encrypted form is updated in database for all candidates. The attacker as well as the administrator or the employees who have access to the database will not be able to distinguish between the ballot stored for the candidate is a vote cast by the voter or a null value. The final county of votes for each candidate is calculated using homomorpnic addition property of Paillier cryptosystem. The proposed system is faster and provide more security as all votes are stored in encrypted form and this will help in maintaining the three traids of the cybersecurity and thus, availability, confidentiality, and integrity of the system. 4.2: Collision Resistance of Homomorphic Encryption The figure below shows the security performance or collision resistance of homomorphic encryption with Paillier algorithm. Figure 4.6: Security Performance of Homomorphic Encryption
  • 15. H o m o m o r p h i c E n c r y p t i o n - P a g e 15 | 19 From the above table, it can be indicated that the security performance with regards to the key size increases with asymmetric encryption and decreases with symmetric encryption. This shows that homomorphic encryption with paillier algorithm are semantically secure and strong against collision resistance. 4.3 Performance and time complexity of Homomorphic Encryption The performance, efficiency and time complexity of the above encryption algorithm is calculated using the size of the key, given in bits as against time, also given in ms. Figure 4.7: Encryption time for Paillier and Elgamal
  • 16. H o m o m o r p h i c E n c r y p t i o n - P a g e 16 | 19 Table 4.1: Encryption time for Paillier Algorithm The above table shows a rise in the encryption time as the length of the key increases. So the combination of homomorphic encryption using Paillier cryptosystem can significantly improve the storage and processing performance in the electronic voting scheme. Therefore, homomorphic encryption can be considered much faster than many other algorithms.
  • 17. H o m o m o r p h i c E n c r y p t i o n - P a g e 17 | 19 CHAPTER FIVE SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS The purpose of this article was to propose authentication algorithm to resolve the deficiencies in RSA and Message Digest Method 5 Algorithms. This section presents the summary of the major findings from the analyses of data, and then, make recommendations and conclusion. 5.1 Summary of Major Findings In the first place, it was revealed that the application of the electronic voting system using homomorphic encryption undergoes four processes which includes registration stage, authentication stage, voting stage and calculation stage where we get to know the results of the election. Secondly, the study indicated that the security performance with regards to the key size increases with asymmetric encryption and decreases with symmetric encryption. This shows that homomorphic encryption with paillier algorithm are semantically secure and strong against collision resistance. Furthermore, the study shows that the combination of homomorphic encryption using Paillier cryptosystem can significantly improve the storage and processing performance in the electronic voting scheme. Therefore, homomorphic encryption can be considered much faster than many other algorithms. 5.2 Recommendation Based on the various findings, I will recommend the proposed Homomorphic Paillier Algorithm as an authentication encryption for electronic voting system rather than RSA and MD 5.
  • 18. H o m o m o r p h i c E n c r y p t i o n - P a g e 18 | 19 5.3 Conclusion Voting through the internet has attracted many people specifically people living far from their homes than traditional system of voting. From past few years, a lot of researchers have started seeking interest in this field due to transparency and security concern. This research paper describes the internet voting system using Paillier algorithm and its homomorphic characteristics. This system gives assurance of data confidentiality and data integrity in which it will use homomorphic properties for calculation of votes in the encrypted form and then decrypting them to get it totally secure. The homomorphic encryption algorithm is semantically secure, stronger collision resistance and much faster processing performance than RSA and MD 5.
  • 19. H o m o m o r p h i c E n c r y p t i o n - P a g e 19 | 19 References SalaviR.R.,MathM.M.,KulkarniU.P.(2019)ASurveyofVariousCryptographicTechniques:F romTraditionalCryptographytoFullyHomomorphicEncryption.In:SainiH.,SayalR.,Govard hanA.,BuyyaR.(eds)InnovationsinComputerScienceandEngineering.LectureNotesinNetw orksandSystems,vol74.Springer,Singapore K.K.Chauhan,A.K.S.SangerandA.Verma,"HomomorphicEncryptionforDataSecurityinClo udComputing,"2015InternationalConferenceonInformationTechnology(ICIT),Bhubanesw ar,2015,pp.206-209. M.Nassar,A.ErradiandQ.M.Malluhi,"Paillier’sencryption:Implementationandcloudapplic ations,"2015InternationalConferenceonAppliedResearchinComputerScienceandEngineeri ng(ICAR),Beirut,2015,pp.1-5.[4]Shihab,TLiji C.Gentryetal.,“Fullyhomomorphicencryptionusingideallattices.”.inSTOC,vol.9,2009,pp. 169–178. Z.Brakerski,C.Gentry,andV.Vaikuntanathan,“(leveled)fullyhomomorphicencryptionwitho utbootstrapping,”.inProceedingsofthe3rdInnovationsinTheoreticalComputerScienceConf erence.ACM,2012,pp.309–325. A.Acar,H.Aksu,A.S.Uluagac,andM.Conti,“Asurveyonhomomorphicencryptionschemes:T heoryandimplementation,”.ACMComput.Surv.,vol.51,pp.79:1–79:35,July2018.