• Corpus ID: 14570523

Implementation of Electronic Voting System in Mobile Phones with Android Operating System

  title={Implementation of Electronic Voting System in Mobile Phones with Android Operating System},
  author={Eliver P{\'e}rez Villegas and Gina Gallegos-Garc{\'i}a and Gualberto Torres and H{\'e}ctor Flores Guti{\'e}rrez},
The evolution of Information Technology (IT) has made possible the development of Electronic Voting Systems and nowadays with the wide-spread of mobile devices, the implementation of Mobile Electronic Voting Systems has been possible. This paper presents the implementation of an Electronic Voting System in mobile phones with Android Operating System. To guarantee the security of data transferred through insecure channels, a mix of symmetric and asymmetric primitives is used alongside with hash… 

Figures and Tables from this paper

An Implementation of Secure Online Voting System

A new way of voting cracks the limitation of traditional voting and focuses on the security and performability of the voting, so that it can reach to " each and Every" voter of "Each and Every Class", which will be a leading stride towards heading India a developed country from developing country.

An Analysis of Secure Online Voting System

A new approach of voting breaks the limitation of traditional voting and focuses on the security and feasibility of the voting, so that it may reach to all the voters from every class, which will be a major step towards making India a developed country from developing country.

M-Voting with Government Authentication System

A mobile voting system which is in essence an online voting system over which users can cast their vote through their smartphones or by applying an e-voting network page to bring out the security.

A design of Voting System by using an Android Apps for fisherman

The project explained where normal process of election in Marine society, that is Persatuan Nelayan Kebangsaan (PNK) Daerah Manjung Utara, Perak to select their organization for the community.

Online Voting System with Reliable Voter Authentication Protocols

The major aim of the public-key encryption e-voting system is to assure reliability and security of the protocol hence guaranteeing voting convenience, and it is more efficient than other E-Voting systems since voters can vote from their devices without extra cost and effort.

A Survey on Android and Web Based Application for Online Voting

The main goal of the project is to denote a voting process, which enables voters to cast a secure and secret ballot over a network as the traditional voting process is time consuming and prone to security breaches.



An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography

The experiment demonstrates that the proposed ECC based scheme can outperform the traditional hybrid symmetric and asymmetric cryptographic scheme in the context of mobile evoting environment.

Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism

  • Y. QiuHuafei Zhu
  • Computer Science
    2009 International Conference on Computational Intelligence and Security
  • 2009
The standard cut-of-the-choose technique is applied to avoid the computational zero-knowledge proofs and it is shown that the proposed scheme is efficient yet somewhat provably secure in the simulation-based paradigm.

Practical multi-candidate election system

A practical multi-candidate election scheme that guarantees privacy of voters, public verifiability, and robustness against a coalition of malicious authorities is described, based on the Paillier cryptosystem and on some related zero-knowledge proof techniques.

Identity based threshold cryptography and blind signatures for electronic voting

This paper proposes the use of bilinear pairings in order to provide the security requirements that an electronic voting protocol must meet, without requiring the entire infrastructure needed in a public key scheme.

A secure electronic voting scheme

A new electronic voting scheme is described which guarantees coercion-resistance as well as privacy, eligibility, unreusability and verifiability, and can be implemented in practical environment since it does not require untappable channel or voting booth.

Blind Signatures for Untraceable Payments

Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the

A method for obtaining digital signatures and public-key cryptosystems

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.

A homomorphic encryption-based secure electronic voting scheme

A homomorphic encryption-based secure secure voting scheme that is based on (5), which guarantees eligibility, unreusability, pri- vacy, veriflability and also receipt-freeness and uncoercibility.

Federal Information Processing Standards Publication 197

  • Advanced Encryption Standard (AES) Computer Security Division.National Institute of Standards and Technology