An efficient mobile voting system security scheme based on elliptic curve cryptography

Ahmad, T, Hu, J and Song, H 2009, 'An efficient mobile voting system security scheme based on elliptic curve cryptography', in W. Zhou (ed.) Proceedings 2009 Third International Conference on Network and System Security (NSS 2009), Gold Coast, Australia, 19-21 October 2009, pp. 474-479.


Document type: Conference Paper
Collection: Conference Papers

Title An efficient mobile voting system security scheme based on elliptic curve cryptography
Author(s) Ahmad, T
Hu, J
Song, H
Year 2009
Conference name International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems, The 3rd International Conference on Network and Security (IDSS-NDS2009)
Conference location Gold Coast, Australia
Conference dates 19-21 October 2009
Proceedings title Proceedings 2009 Third International Conference on Network and System Security (NSS 2009)
Editor(s) W. Zhou
Publisher IEEE
Place of publication Danvers, USA
Start page 474
End page 479
Total pages 6
Abstract The wide-spread use of mobile devices has made it possible to develop mobile voting systems as a complement to the existing electronic voting system. However, due to limited onboard resource, it is challenging to achieve both efficiency and security strength for mobile voting system. Conventional solution is to either use symmetric encryption algorithms or hybrid symmetric and asymmetric algorithms at the expense of weaker security strength. In out proposed mobile voting scheme, the user's votes are secured by using the elliptic curve cryptography (ECC) algorithm. ECC is chosen as it has smaller key size than other public key cryptographies; and its homomorphic encryption property which is able to keep user's anonymity. We evaluate the method of ECDH with AES and ECC in comparision with our proposed method. The experiment demonstrates that our proposed ECC-based scheme can outperform the traditional hybrid symmetric and asymmetric cryptographic scheme in the context of mobile e-voting environment.
Subjects Computer System Security
Keyword(s) SCADA
security
testbed
DDoS
DOI - identifier 10.1109/NSS.2009.57
Copyright notice © 2009 IEEE
ISBN 978-0-7695-3838-9
Versions
Version Filter Type
Citation counts: Scopus Citation Count Cited 15 times in Scopus Article | Citations
Altmetric details:
Access Statistics: 323 Abstract Views  -  Detailed Statistics
Created: Fri, 02 Jul 2010, 12:19:48 EST by Catalyst Administrator
© 2014 RMIT Research Repository • Powered by Fez SoftwareContact us