Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/22999
Title: | Some studies on protocols and their implementation for secured electronic voting system |
Researcher: | Kalaichelvi V |
Guide(s): | Chandrasekaran R M |
Keywords: | Biometric smart card Electronic voting system Information and communication engineering |
Upload Date: | 20-Aug-2014 |
University: | Anna University |
Completed Date: | 01/05/2012 |
Abstract: | Election is a fundamental instrument of democracy that provides an official mechanism for the people to convey their views to form a government by democratic means Electronic voting has become the most important application in e governance and e democracy Recently few newlinecountries have taken the initiative to test and use electronic voting system Many countries believe that internet voting will be possible within the next decade In the traditional voting system the voter authenticates themselves by showing credentials this step is public and it is verified by the officials present in the polling place In this authentication verification is done manually and then they are allowed to cast their vote The traditional voting method is expensive and involves more human resources Due to these reasons the whole world is moving towards the trend of e voting newlineElectronic voting systems are expected to be the solution to overcome the shortfalls Since 1980 electronic voting schemes attracted many researchers In the last few years numerous numbers of researchers proposed different e voting systems and some countries and states around the world have implemented their e voting systems To overcome these drawbacks many cryptographers have newlineproposed a secure e voting system using cryptographic techniques While more and more protocols have been developed the set of security properties that a protocol has to achieve is evolved There are severalrequirements for a secure e voting system such as uniqueness efficiency fairness security privacy authentication anonymity and uncoercibility The several requirements can be satisfied partially by cryptographic techniques Thus researchers kept combining existing or created newlinecryptographic primitives to construct efficient electronic voting schemes with respect to these security requirements newline newline newline |
Pagination: | xv, 157p. |
URI: | http://hdl.handle.net/10603/22999 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 65.52 kB | Adobe PDF | View/Open |
02_certificate.pdf | 273.06 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 13.24 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 6.59 kB | Adobe PDF | View/Open | |
05_contents.pdf | 19.23 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 268.67 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 24.91 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 213.14 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 22.01 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 615.13 kB | Adobe PDF | View/Open | |
11_chapter6.pdf | 597.63 kB | Adobe PDF | View/Open | |
12_chapter7.pdf | 390.42 kB | Adobe PDF | View/Open | |
13_chapter8.pdf | 1.15 MB | Adobe PDF | View/Open | |
14_chapter9.pdf | 14.5 kB | Adobe PDF | View/Open | |
15_references.pdf | 23.61 kB | Adobe PDF | View/Open | |
16_publications.pdf | 7.63 kB | Adobe PDF | View/Open | |
17_vitae.pdf | 5.37 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: