SlideShare a Scribd company logo
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 301
Secure Verifiable Mobile Voting Based On
Kerberos Mechanism
Abdullahi Yahya Imam
(Department of Information Technology, Bayero University, Kano, Nigeria)
Email:ayimam.it@buk.edu.ng
-------------------------**********************************---------------------------
Abstract:
Recent technological breakthroughs make the use of mobile smartphones in our daily lives so ubiquitous.
Democratic systems mostly depend on elections to provide teeming electorates the right to vote for their
leaders or to express their views in referendums. In literature, several electronic voting systems from
standalone to mobile were proposed. However, a valid and usable electronic voting system supposes to
meet some requirements among which vote verifiability is a challenge to many of the current systems.
Thus, this paper proposes a mobile phone e-voting system based on Kerberos authentication mechanism
which achieves vote verifiability using a cryptographic tag each voter produces independently. The
proposed system uses secure symmetric key cryptography to fit the most used mobile devices’
performance.
Keywords —electronic voting, verifiability, cryptographic tag,Kerberos authentication, two–factor
authentication.
----------------------------------------************************----------------------------------
I. INTRODUCTION
The advent of smartphones made mobile voting
a research area. Nowadays people use smartphones
in their daily activities such as mobile banking,
online shopping and many more. Thus, mobile
voting should also not be an exception. Recently,
several works propose different mobile phone
voting schemes. Unlike traditional voting system,
known as paper-based, electronic voting provides
platform where electronic devices are used to carry
out the tasks. It is not vague that paper-based
schemes could have less performance and accuracy
than electronic voting system. Certainly, electronic
voting protocol has some additional requirements
compared to traditional paper–based schemes. An
ideal voting protocol of secure electronic voting has
the following requirements [1]:
(a) Only authenticated and authorized voters
can cast vote in an election.
(b) The system does not allow anyone to cast
vote more than once.
(c) Neither voting authority nor election
participant can determine for whom anyone
else voted.
(d) There is no way someone’s vote can be
duplicated.
(e) Any change to voter’s choice can be
detected.
(f) Every voter can make sure that his vote has
been taken into account in the final
tabulation.
(g) Everyone knows who voted and who didn’t.
In addition to these, mobile voting also needs
internet connection. Thus it is prone to more
security challenges than standalone ones. If
implemented successfully, mobile votingsystem
would provide more flexibility and mobility
compared to a standalone electronic system which
requires the presence of the voter at the voting
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 302
booth. It also allows a voter to cast his vote from
his convenient location as long as the Internet
service is available therein. Among the above
mentioned requirements, vote verifiability—every
voter can make sure that his vote has been taken
into account in the final tabulation and everyone
knows who voted and who did not vote—happens
to be a challenge to many electronic voting systems.
Popoveniuc et al. [2] describes end–to–end
verifiable election as one which meets the following
performance requirements.
a) The representation of the voter’s choices on
the ballot agrees with the representation that
will be read by the rest of the election
system.
b) Cast ballots do not contain over-votes or
negative votes.
c) The ballot the voter cast is the one that was
received and saved by the voting system.
d) No ballots are included in the final tally that
could not have been checked by at least one
voter.
In order to achieve some of the stated
requirements, there are some proposed schemes that
enable the voter to retrieve his vote from voting
authority to ensure it is recorded as voted. But such
schemes could be vulnerable to buying and selling
of votes as the buyer can ensure that the seller votes
as promised. To mitigate such scenario, some
receipt-free schemes were proposed which make it
impossible for a voter to reveal the way he voted
[1].
This work proposes a mobile phone voting
scheme that enables vote verifiability as well as
eliminating buying and selling ofthe votes. Thus,
this scheme is in between the above two mentioned
schemes. It uses some of Kerberos authentication
mechanisms along with a cryptographic tag.
The remainder of this paper is organized as
follows. Section 2 provides literature review of the
related works. Section 3 states the design goals,
while section 4 explains the proposed model and
design. Section 5 gives justification of the design
goals of the proposed model. Section 6 draws
conclusions.
II. LITERATURE REVIEW OF THE
RELATED WORKS
This section reviews some related works from
standalone electronic voting to fully mobile phone
voting systems. In literature, several attempts were
put in place to achieve deployable electronic voting
systems. Chaum proposed the verifiable electronic
voting scheme using blind signature [3]. Recently,
[4] came up with a way based on blind signature
and Kerberos mechanism to provide a lightweight
scheme by removal of the Certificate Authority and
the use of symmetric key algorithms throughout the
system. Blind signature schemes can provide
secrecy and individually verifiable (every voter can
make sure that his vote has been taken into account
in the final tabulation) but does not support
universal verifiability (everyone knows who voted
and who didn’t).
Kazue and Joe [5] present a receipt-free scheme
that facilitates both individual and universal
verifiable voting protocol. The scheme is based on
the mix-type voting technique that uses collection
of servers to shuffle the encrypted votes till the
relationship between the voter and vote is hidden.
Such scheme is categorized as inefficient for large
scale voting as it incurs high computational
overhead.
In 2013 Estonian local municipal elections and
the 2014 European Parliament elections a scheme
known as Verifiable Internet Voting in Estonia was
used [6]. The scheme allows the voters to check the
cast-as-intended and recorded-as-cast properties of
their vote by using a mobile device. The voter
retrieves the encrypted vote from the voting server
then applies some cryptographic calculations to
verify. This provides individual verifiability only.
Moreover, it requires the voter to use two different
devices-one for voting and the other for verification
processes- and yet it is vulnerable to buying and
selling of votes as the buyer can make the voter to
prove what he voted for.
Besides the aforementioned, there are some
proposed mobile voting schemes in the literature
[7], [8], [9] and [10]. Based on my survey, most of
them do not concentrate on vote verifiability rather
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 303
than authentication and confidentiality.
III. DESIGN GOALS
From the literature survey, existing mobile
voting schemes mostly do not provide solution to
vote verifiability. As discussed, they mostly
propose solutions to authentication and
authorization alone. Considering its importance in
achieving free and fair election, this work suggests
a mobile voting scheme that meets the following
requirements:
1. Efficient use of secure symmetric
cryptographic algorithms to suit most
mobile devices performance.
2. Only authenticated and authorized voters
can vote.
3. No one can determine for whom anyone else
voted.
4. Every voter can make sure that his vote has
been taken into account in the final
tabulation.
5. Everyone knows who voted and who didn’t.
6. Cast ballots do not contain over-votes or
negative votes.
IV. PROPOSED SYSTEM MODEL AND
DESIGN
This section describes the model of the
proposed voting system with detailed explanation
of how it works. The scheme is mainly made of the
following phases: two-level voter authentication,
secure cryptographic tag generation and vote, vote
tabulation and verifiability. Fig.1 contains the
architectural design of the proposed system.
Voter Authentication Server (VAS) has the
database of registered voters before the Election
Day. The database maintains Voter Card Number
VCN which identifies a voter, registered mobile
phone and secure password of each voter.
VAS follows these steps to determine an eligible
voter in the election period:
a. A prospective voter (V) sends his plaintext VCN
to VAS which decides eligible of the voter.
b. VAS sends identity authentication SMS to only
eligible voter’s registered phone number.
c. The voter uses his password, generates
symmetric key Kp to encrypt the identity
authentication code received and sends it via
Internet to VAS.
d. VAS generates similar symmetric key Kp from
corresponding voter’s password in its database
and decrypts the identity authentication code.
e. VAS then generates a unique symmetric voting
key Kv, encrypts it with Kp and sends to a
successfully authenticated voter.
f. It also sends the copy of that Kv to Voting Box
Server VBS.
Fig.1 Architecture of the proposed system
4.1 Voter Two-Level Authentication Phase
4.2 Generating Secure Vote Verification Tag and
VOTE Phase
The ability of each and every voter to
securely produce a unique and easily identifiable
tag that does not reveal confidential information
about the candidate he elected is the substantial
stage to achieve vote verifiability in our scheme. In
the election, every voter generates such tag and
attaches to his chosen candidate. We termed this tag
as SVVT (Secure Vote Verification Tag). Each voter
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 304
prepares SVVT and casts his vote using the
following VOTE Preparation:
Algorithm:
Description of the above algorithm:
a. Random Number Generation: voter generates
random number R.
b. Pre-SVVT: voter uses his given Kv to encrypt R.
c. SVVT: voter takes the SHA-2 of the Pre-SVVT.
d. VOTE: voter combines the copy of his SVVT to
the candidate and encrypts with Kv. He then
sends it to VBS.
4.3 Vote Tabulation and Verifiability Phase
Once VBS receives a VOTE from a voter, it
applies the corresponding Kv it receives from VAS
to decrypt that vote. It then tallies the valid vote as
follows:
= ( ){ ℎ 	||		 }
a. VBS takes the choice into tabulation and
sends the SVVT to VAS via secure channel.
b. VAS then marks voter as voted and records
the SVVT for the respective voter. It also
sends the SVVT copy to the voter to verify.
c. When the election time is over, VAS
announces publically the voters with their
respective SVVT and voting status (either
voted or not voted).
d. On the other hand, VBS also independently
announces the candidates with their
respective tallies.
e. Individuals and publics can use the two
independent releases from VAS and VBS to
validate the election result.
V. JUSTIFICATION OF OUR STATED
DESIGN GOALS
This section discusses the justification and
analysis of our design goals. The syste implemented
in Java programming for Android
platforms.Following are the design goals along with
their corresponding validations.
a. Efficient use of Symmetric Cryptographic
Algorithms to Suit Most Mobile Devices:
Using algorithms that can perform
efficiently is of paramount importance to our
proposed system. Basically, Kerberos release
from MIT uses Data Encryption Standard
(DES) algorithm. Due to short key length and
some other security challenges, Nowadays DES
is considered as less secure. SinceI incorporate
some of Kerberos authentication mechanisms
into the work and at the same it wants achieve
high security, I use Advanced Encryption
Standard (AES-128) algorithms rather than
DES. However, to determine the performance
overhead that AES128 can incur compared to
DES, I implemented and tested the work using
both the DES and AES128 algorithms. Table 1
contains the results of the measurements.The
test was performed on some of the commonly
used android devices.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 305
Table 1 Sampled Devices and Measurements
We recorded the VOTE Preparation
Algorithm running time on the devices whose
specifications are as in Table 1.
Fig.2 Performances graph for DES & AES-128
Based on this result, it is clear that the
performance overhead incurred by AES128 is more
affordable compared to basicDES.Thus, the
proposed system can perform well on commonly
used Android smartphones.
b. Only Authorized Voters Can Vote:each voter
authenticates himself with VAS before getting
the voting key which serves as a ticket to cast
vote in VBS. Sending authentication code to
voter’s mobile phone along with using his/her
password for encrypting furthercommunications
between VAS and a voter proves that only the
outright owner of the phone
and the password can
authenticate successfully.
c. No One Can Determine
For Whom Anyone Else
Voted:the separation of the
voting system into VAS and
VBS enables each entity to
maintain some specific
information that helps
accomplish this goal. VAS
maintains the voters’ database
and acts as voting-key
generator as well. It does not
have access to the votes
throughout the election. Meanwhile, the VBS
which receives encrypted votes from voters
does not have access to the voters’ database
residing in AS. Thus, it does not know detailed
identity of the voter. It only knows the voting
key that can decrypts the received vote.
d. Every Voter Can Make Sure That His Vote
Has Been Taken Into Account In The Final
Tabulation: a voter prepares VOTE and sends
to VBS which decrypts and separates it into
choice and SVVT. It then tallies the valid voter’s
choice.
e. Everyone Knows Who Voted And Who
Didn’t:from the information VAS releases,
voters can compare the list of the voter with
tallies from VBS. Every voter must find his
exact SVVT in VAS list. Everyone can check
the list from VAS to determine who voted. If
need arises, anyone can ask the voters to submit
their SVVT to verify no one is missing from the
list.
f. Cast Ballots Do Not Contain Over-Votes Or
Negative Votes:the independent results from
VBS must follow the result VAS releases. An
inconsistency in the two separate information
leads to invalid result.
Device
Model
Processor RAM Android
OS
Version
DES:
Vote
Preparation
Time
(in Micro
second)
AES-128:
Vote
Preparation
Time
(in Micro
second)
Samsung
GT-S531F
1.2 GHz
Quad
Core
1GB 5.1.1 2546 3690
Samsung
SM-
G360H 1.1GHz
1GB 4.4 3070 3787
HTC
Desire 626
1.7 GHz
Octa-core
2GB 4.4.2 2912 3575
Samsung
SGH-I747
1.5GHz
Advanced
dual Core
2GB 4.4 2872 3377
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 306
VI. CONCLUSION
This paper describes a verifiable mobile voting
system that incorporates some of Kerberos
authentication mechanisms. It explains how to
achieve secure voter authentication using some of
Kerberos mechanisms which employ two-factor
authentication. This work achieves its main target,
both individual and public vote verifiability, using a
cryptographic tag that does not reveal information
about the voter’s choice rather than enabling him to
track his vote. Finally, majority of currently used
android devices can also support the proposed
system with less performance overhead.
REFERENCES
[1] S. Bruice, Applied Cryptography: Protocols,
Algorithms, and Source Code in C (2nd
ed.).
(Sharda OffPress, Delhi:Wiley), (2001).
p.121.
[2] S. Popoveniuc, J. Kelsey, A. Regenscheid
and P. Vora, “Performance requirements
for end-to-end verifiable elections”, In
Proceedings of the 2010 international
conference on Electronic voting
technology/workshop on trustworthy
elections, (EVT/WOTE’10, 2010). p.1-16.
[3] D. Chaum, “Untraceable electronic mail,
return addresses, and digital pseudonyms”
(Communications of the ACM, 1981), pp.
84-88.
[4] Z. Hongyu, Y. Qianzi and Z. Junxing, “A
lightweight electronic voting scheme based
on blind signature and Kerberos
mechanism”, IEEE 2015, pp. 210-214.
[5] S. Kazue and K. Joe, “Receipt-Free Mix-
Type Voting Scheme --A practical solution
to the implementation of a voting booth”,
Advances in Cryptology—EUROCRYPT
’95 Proceedings, (Springer-Verlag, 1995),
pp. 393-403.
[6] H. Ven and W. Jan, “Verifiable Internet
Voting in Estonia”, Proceedings of 2014
International Conference on Electronic
Voting EVOTE 2014, (E-Voting.CC GmbH,
2014), pp. 1-7.
[7] P. Deniel and A. S. Dan, “A Hybrid Mobile
Biometric-Based E-Voting System”,Proc. of
the 9th
International Symposium on
Advanced Topics in Electrical Engineering,
May 7-9, 2015, (Bucharest, Romania, IEEE,
2015), pp. 37-42.
[8] K. Adel, G. Yasmin, S. Dima, M. Dalya and
Shastry P.V.S, “M-Vote: A Reliable and
Highly Secure Mobile Voting System”,Proc.
of 2013 Palestinian International
Conference on Information and
Communication Technology, (IEEE, 2013),
pp. 90-98.
[9] K. A. Hussein , S. I. Mohammad and M. D.
Omar, “Secure Internet Voting System
based on Public Key Kerberos” ,
Proceedings of IJCSI International Journal
of Computer Science Issues, (Vol. 9, Issue
2, No 3, 2012), pp. 428-434.
[10] U. Mohib, I. U. Arif, Noor ul Amin
and Nizamuddin, “An Efficient and Secure
Mobile Phone Voting System”, (IEEE,
2013), pp. 332-336.

More Related Content

What's hot

Online e voting
Online e votingOnline e voting
Online e voting
MerbinJose
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
IJNSA Journal
 
M voting
M votingM voting
M voting
Vijju Lakkundi
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET Journal
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
abadmgr
 
M – Voting
M – VotingM – Voting
M – Voting
Raksha Shetty
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
cscpconf
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
eSAT Journals
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
IRJET Journal
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
vasim hasina
 
E voting app
E voting appE voting app
E voting app
Amitabha Das
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
Lhakpa Yangji
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
Morine Gakii
 
F1802024245
F1802024245F1802024245
F1802024245
IOSR Journals
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
Cloud Vote
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodh
Vinodh Kumar
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
chandu namani
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Voting
ashevch
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
jannatul haque
 
E-voting
E-votingE-voting
E-voting
Dushyant Singh
 

What's hot (20)

Online e voting
Online e votingOnline e voting
Online e voting
 
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTIONA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
 
M voting
M votingM voting
M voting
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
 
M – Voting
M – VotingM – Voting
M – Voting
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
 
mobile-iris voting system(1)
mobile-iris voting system(1)mobile-iris voting system(1)
mobile-iris voting system(1)
 
E voting app
E voting appE voting app
E voting app
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
 
F1802024245
F1802024245F1802024245
F1802024245
 
A Transition To Mobile Voting Systems
A Transition To Mobile Voting SystemsA Transition To Mobile Voting Systems
A Transition To Mobile Voting Systems
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodh
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Voting
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
 
E-voting
E-votingE-voting
E-voting
 

Similar to Secure Verifiable Mobile Voting Based On Kerberos Mechanism

project presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxproject presentation -2 nov (2).pptx
project presentation -2 nov (2).pptx
muralimurali239921
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
abdallah76803
 
F017513138
F017513138F017513138
F017513138
IOSR Journals
 
Blockchain Based E-Voting System
Blockchain Based E-Voting SystemBlockchain Based E-Voting System
Blockchain Based E-Voting System
IRJET Journal
 
IRJET- A Decentralized Voting Application using Blockchain Technology
IRJET- 	 A Decentralized Voting Application using Blockchain TechnologyIRJET- 	 A Decentralized Voting Application using Blockchain Technology
IRJET- A Decentralized Voting Application using Blockchain Technology
IRJET Journal
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
IRJET Journal
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
IJERA Editor
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
Monira Monir
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
IJMTST Journal
 
Internet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain TechnologyInternet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain Technology
IRJET Journal
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET Journal
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
IRJET Journal
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
IRJET Journal
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
eSAT Publishing House
 
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAINDECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
IRJET Journal
 
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter CardsSafe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
ijcisjournal
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
Associate Professor in VSB Coimbatore
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
smeetramteke
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
IRJET Journal
 

Similar to Secure Verifiable Mobile Voting Based On Kerberos Mechanism (20)

project presentation -2 nov (2).pptx
project presentation -2 nov (2).pptxproject presentation -2 nov (2).pptx
project presentation -2 nov (2).pptx
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology The Future of Democracy Secure Online Voting Powered by Blockchain Technology
The Future of Democracy Secure Online Voting Powered by Blockchain Technology
 
F017513138
F017513138F017513138
F017513138
 
Blockchain Based E-Voting System
Blockchain Based E-Voting SystemBlockchain Based E-Voting System
Blockchain Based E-Voting System
 
IRJET- A Decentralized Voting Application using Blockchain Technology
IRJET- 	 A Decentralized Voting Application using Blockchain TechnologyIRJET- 	 A Decentralized Voting Application using Blockchain Technology
IRJET- A Decentralized Voting Application using Blockchain Technology
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Internet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain TechnologyInternet – Voting System Using Blockchain Technology
Internet – Voting System Using Blockchain Technology
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAINDECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
DECENTRALIZED VOTING SYSTEM USING BLOCKCHAIN
 
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter CardsSafe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
E-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for SecurityE-Voting Using Blockchain Technology for Security
E-Voting Using Blockchain Technology for Security
 
IRJET- Decentralized E-Voting System
IRJET-  	  Decentralized E-Voting SystemIRJET-  	  Decentralized E-Voting System
IRJET- Decentralized E-Voting System
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
IJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
IJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
IJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
IJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 

Recently uploaded (20)

一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 

Secure Verifiable Mobile Voting Based On Kerberos Mechanism

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 301 Secure Verifiable Mobile Voting Based On Kerberos Mechanism Abdullahi Yahya Imam (Department of Information Technology, Bayero University, Kano, Nigeria) Email:ayimam.it@buk.edu.ng -------------------------**********************************--------------------------- Abstract: Recent technological breakthroughs make the use of mobile smartphones in our daily lives so ubiquitous. Democratic systems mostly depend on elections to provide teeming electorates the right to vote for their leaders or to express their views in referendums. In literature, several electronic voting systems from standalone to mobile were proposed. However, a valid and usable electronic voting system supposes to meet some requirements among which vote verifiability is a challenge to many of the current systems. Thus, this paper proposes a mobile phone e-voting system based on Kerberos authentication mechanism which achieves vote verifiability using a cryptographic tag each voter produces independently. The proposed system uses secure symmetric key cryptography to fit the most used mobile devices’ performance. Keywords —electronic voting, verifiability, cryptographic tag,Kerberos authentication, two–factor authentication. ----------------------------------------************************---------------------------------- I. INTRODUCTION The advent of smartphones made mobile voting a research area. Nowadays people use smartphones in their daily activities such as mobile banking, online shopping and many more. Thus, mobile voting should also not be an exception. Recently, several works propose different mobile phone voting schemes. Unlike traditional voting system, known as paper-based, electronic voting provides platform where electronic devices are used to carry out the tasks. It is not vague that paper-based schemes could have less performance and accuracy than electronic voting system. Certainly, electronic voting protocol has some additional requirements compared to traditional paper–based schemes. An ideal voting protocol of secure electronic voting has the following requirements [1]: (a) Only authenticated and authorized voters can cast vote in an election. (b) The system does not allow anyone to cast vote more than once. (c) Neither voting authority nor election participant can determine for whom anyone else voted. (d) There is no way someone’s vote can be duplicated. (e) Any change to voter’s choice can be detected. (f) Every voter can make sure that his vote has been taken into account in the final tabulation. (g) Everyone knows who voted and who didn’t. In addition to these, mobile voting also needs internet connection. Thus it is prone to more security challenges than standalone ones. If implemented successfully, mobile votingsystem would provide more flexibility and mobility compared to a standalone electronic system which requires the presence of the voter at the voting RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 302 booth. It also allows a voter to cast his vote from his convenient location as long as the Internet service is available therein. Among the above mentioned requirements, vote verifiability—every voter can make sure that his vote has been taken into account in the final tabulation and everyone knows who voted and who did not vote—happens to be a challenge to many electronic voting systems. Popoveniuc et al. [2] describes end–to–end verifiable election as one which meets the following performance requirements. a) The representation of the voter’s choices on the ballot agrees with the representation that will be read by the rest of the election system. b) Cast ballots do not contain over-votes or negative votes. c) The ballot the voter cast is the one that was received and saved by the voting system. d) No ballots are included in the final tally that could not have been checked by at least one voter. In order to achieve some of the stated requirements, there are some proposed schemes that enable the voter to retrieve his vote from voting authority to ensure it is recorded as voted. But such schemes could be vulnerable to buying and selling of votes as the buyer can ensure that the seller votes as promised. To mitigate such scenario, some receipt-free schemes were proposed which make it impossible for a voter to reveal the way he voted [1]. This work proposes a mobile phone voting scheme that enables vote verifiability as well as eliminating buying and selling ofthe votes. Thus, this scheme is in between the above two mentioned schemes. It uses some of Kerberos authentication mechanisms along with a cryptographic tag. The remainder of this paper is organized as follows. Section 2 provides literature review of the related works. Section 3 states the design goals, while section 4 explains the proposed model and design. Section 5 gives justification of the design goals of the proposed model. Section 6 draws conclusions. II. LITERATURE REVIEW OF THE RELATED WORKS This section reviews some related works from standalone electronic voting to fully mobile phone voting systems. In literature, several attempts were put in place to achieve deployable electronic voting systems. Chaum proposed the verifiable electronic voting scheme using blind signature [3]. Recently, [4] came up with a way based on blind signature and Kerberos mechanism to provide a lightweight scheme by removal of the Certificate Authority and the use of symmetric key algorithms throughout the system. Blind signature schemes can provide secrecy and individually verifiable (every voter can make sure that his vote has been taken into account in the final tabulation) but does not support universal verifiability (everyone knows who voted and who didn’t). Kazue and Joe [5] present a receipt-free scheme that facilitates both individual and universal verifiable voting protocol. The scheme is based on the mix-type voting technique that uses collection of servers to shuffle the encrypted votes till the relationship between the voter and vote is hidden. Such scheme is categorized as inefficient for large scale voting as it incurs high computational overhead. In 2013 Estonian local municipal elections and the 2014 European Parliament elections a scheme known as Verifiable Internet Voting in Estonia was used [6]. The scheme allows the voters to check the cast-as-intended and recorded-as-cast properties of their vote by using a mobile device. The voter retrieves the encrypted vote from the voting server then applies some cryptographic calculations to verify. This provides individual verifiability only. Moreover, it requires the voter to use two different devices-one for voting and the other for verification processes- and yet it is vulnerable to buying and selling of votes as the buyer can make the voter to prove what he voted for. Besides the aforementioned, there are some proposed mobile voting schemes in the literature [7], [8], [9] and [10]. Based on my survey, most of them do not concentrate on vote verifiability rather
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 303 than authentication and confidentiality. III. DESIGN GOALS From the literature survey, existing mobile voting schemes mostly do not provide solution to vote verifiability. As discussed, they mostly propose solutions to authentication and authorization alone. Considering its importance in achieving free and fair election, this work suggests a mobile voting scheme that meets the following requirements: 1. Efficient use of secure symmetric cryptographic algorithms to suit most mobile devices performance. 2. Only authenticated and authorized voters can vote. 3. No one can determine for whom anyone else voted. 4. Every voter can make sure that his vote has been taken into account in the final tabulation. 5. Everyone knows who voted and who didn’t. 6. Cast ballots do not contain over-votes or negative votes. IV. PROPOSED SYSTEM MODEL AND DESIGN This section describes the model of the proposed voting system with detailed explanation of how it works. The scheme is mainly made of the following phases: two-level voter authentication, secure cryptographic tag generation and vote, vote tabulation and verifiability. Fig.1 contains the architectural design of the proposed system. Voter Authentication Server (VAS) has the database of registered voters before the Election Day. The database maintains Voter Card Number VCN which identifies a voter, registered mobile phone and secure password of each voter. VAS follows these steps to determine an eligible voter in the election period: a. A prospective voter (V) sends his plaintext VCN to VAS which decides eligible of the voter. b. VAS sends identity authentication SMS to only eligible voter’s registered phone number. c. The voter uses his password, generates symmetric key Kp to encrypt the identity authentication code received and sends it via Internet to VAS. d. VAS generates similar symmetric key Kp from corresponding voter’s password in its database and decrypts the identity authentication code. e. VAS then generates a unique symmetric voting key Kv, encrypts it with Kp and sends to a successfully authenticated voter. f. It also sends the copy of that Kv to Voting Box Server VBS. Fig.1 Architecture of the proposed system 4.1 Voter Two-Level Authentication Phase 4.2 Generating Secure Vote Verification Tag and VOTE Phase The ability of each and every voter to securely produce a unique and easily identifiable tag that does not reveal confidential information about the candidate he elected is the substantial stage to achieve vote verifiability in our scheme. In the election, every voter generates such tag and attaches to his chosen candidate. We termed this tag as SVVT (Secure Vote Verification Tag). Each voter
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 304 prepares SVVT and casts his vote using the following VOTE Preparation: Algorithm: Description of the above algorithm: a. Random Number Generation: voter generates random number R. b. Pre-SVVT: voter uses his given Kv to encrypt R. c. SVVT: voter takes the SHA-2 of the Pre-SVVT. d. VOTE: voter combines the copy of his SVVT to the candidate and encrypts with Kv. He then sends it to VBS. 4.3 Vote Tabulation and Verifiability Phase Once VBS receives a VOTE from a voter, it applies the corresponding Kv it receives from VAS to decrypt that vote. It then tallies the valid vote as follows: = ( ){ ℎ || } a. VBS takes the choice into tabulation and sends the SVVT to VAS via secure channel. b. VAS then marks voter as voted and records the SVVT for the respective voter. It also sends the SVVT copy to the voter to verify. c. When the election time is over, VAS announces publically the voters with their respective SVVT and voting status (either voted or not voted). d. On the other hand, VBS also independently announces the candidates with their respective tallies. e. Individuals and publics can use the two independent releases from VAS and VBS to validate the election result. V. JUSTIFICATION OF OUR STATED DESIGN GOALS This section discusses the justification and analysis of our design goals. The syste implemented in Java programming for Android platforms.Following are the design goals along with their corresponding validations. a. Efficient use of Symmetric Cryptographic Algorithms to Suit Most Mobile Devices: Using algorithms that can perform efficiently is of paramount importance to our proposed system. Basically, Kerberos release from MIT uses Data Encryption Standard (DES) algorithm. Due to short key length and some other security challenges, Nowadays DES is considered as less secure. SinceI incorporate some of Kerberos authentication mechanisms into the work and at the same it wants achieve high security, I use Advanced Encryption Standard (AES-128) algorithms rather than DES. However, to determine the performance overhead that AES128 can incur compared to DES, I implemented and tested the work using both the DES and AES128 algorithms. Table 1 contains the results of the measurements.The test was performed on some of the commonly used android devices.
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 305 Table 1 Sampled Devices and Measurements We recorded the VOTE Preparation Algorithm running time on the devices whose specifications are as in Table 1. Fig.2 Performances graph for DES & AES-128 Based on this result, it is clear that the performance overhead incurred by AES128 is more affordable compared to basicDES.Thus, the proposed system can perform well on commonly used Android smartphones. b. Only Authorized Voters Can Vote:each voter authenticates himself with VAS before getting the voting key which serves as a ticket to cast vote in VBS. Sending authentication code to voter’s mobile phone along with using his/her password for encrypting furthercommunications between VAS and a voter proves that only the outright owner of the phone and the password can authenticate successfully. c. No One Can Determine For Whom Anyone Else Voted:the separation of the voting system into VAS and VBS enables each entity to maintain some specific information that helps accomplish this goal. VAS maintains the voters’ database and acts as voting-key generator as well. It does not have access to the votes throughout the election. Meanwhile, the VBS which receives encrypted votes from voters does not have access to the voters’ database residing in AS. Thus, it does not know detailed identity of the voter. It only knows the voting key that can decrypts the received vote. d. Every Voter Can Make Sure That His Vote Has Been Taken Into Account In The Final Tabulation: a voter prepares VOTE and sends to VBS which decrypts and separates it into choice and SVVT. It then tallies the valid voter’s choice. e. Everyone Knows Who Voted And Who Didn’t:from the information VAS releases, voters can compare the list of the voter with tallies from VBS. Every voter must find his exact SVVT in VAS list. Everyone can check the list from VAS to determine who voted. If need arises, anyone can ask the voters to submit their SVVT to verify no one is missing from the list. f. Cast Ballots Do Not Contain Over-Votes Or Negative Votes:the independent results from VBS must follow the result VAS releases. An inconsistency in the two separate information leads to invalid result. Device Model Processor RAM Android OS Version DES: Vote Preparation Time (in Micro second) AES-128: Vote Preparation Time (in Micro second) Samsung GT-S531F 1.2 GHz Quad Core 1GB 5.1.1 2546 3690 Samsung SM- G360H 1.1GHz 1GB 4.4 3070 3787 HTC Desire 626 1.7 GHz Octa-core 2GB 4.4.2 2912 3575 Samsung SGH-I747 1.5GHz Advanced dual Core 2GB 4.4 2872 3377
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 6, Nov- Dec 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 306 VI. CONCLUSION This paper describes a verifiable mobile voting system that incorporates some of Kerberos authentication mechanisms. It explains how to achieve secure voter authentication using some of Kerberos mechanisms which employ two-factor authentication. This work achieves its main target, both individual and public vote verifiability, using a cryptographic tag that does not reveal information about the voter’s choice rather than enabling him to track his vote. Finally, majority of currently used android devices can also support the proposed system with less performance overhead. REFERENCES [1] S. Bruice, Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). (Sharda OffPress, Delhi:Wiley), (2001). p.121. [2] S. Popoveniuc, J. Kelsey, A. Regenscheid and P. Vora, “Performance requirements for end-to-end verifiable elections”, In Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections, (EVT/WOTE’10, 2010). p.1-16. [3] D. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms” (Communications of the ACM, 1981), pp. 84-88. [4] Z. Hongyu, Y. Qianzi and Z. Junxing, “A lightweight electronic voting scheme based on blind signature and Kerberos mechanism”, IEEE 2015, pp. 210-214. [5] S. Kazue and K. Joe, “Receipt-Free Mix- Type Voting Scheme --A practical solution to the implementation of a voting booth”, Advances in Cryptology—EUROCRYPT ’95 Proceedings, (Springer-Verlag, 1995), pp. 393-403. [6] H. Ven and W. Jan, “Verifiable Internet Voting in Estonia”, Proceedings of 2014 International Conference on Electronic Voting EVOTE 2014, (E-Voting.CC GmbH, 2014), pp. 1-7. [7] P. Deniel and A. S. Dan, “A Hybrid Mobile Biometric-Based E-Voting System”,Proc. of the 9th International Symposium on Advanced Topics in Electrical Engineering, May 7-9, 2015, (Bucharest, Romania, IEEE, 2015), pp. 37-42. [8] K. Adel, G. Yasmin, S. Dima, M. Dalya and Shastry P.V.S, “M-Vote: A Reliable and Highly Secure Mobile Voting System”,Proc. of 2013 Palestinian International Conference on Information and Communication Technology, (IEEE, 2013), pp. 90-98. [9] K. A. Hussein , S. I. Mohammad and M. D. Omar, “Secure Internet Voting System based on Public Key Kerberos” , Proceedings of IJCSI International Journal of Computer Science Issues, (Vol. 9, Issue 2, No 3, 2012), pp. 428-434. [10] U. Mohib, I. U. Arif, Noor ul Amin and Nizamuddin, “An Efficient and Secure Mobile Phone Voting System”, (IEEE, 2013), pp. 332-336.