Electronic Voting Algorithm and Its Algebraic Formation

International Journal of Mathematical Trends and Technology (IJMTT)          
© 2014 by IJMTT Journal
Volume-10 Number-1                          
Year of Publication : 2014
Authors : M. Mesbahuddin Sarker, Dr. Md. Sharif Uddin


M. Mesbahuddin Sarker, Dr. Md. Sharif Uddin. "Electronic Voting Algorithm and Its Algebraic Formation", International Journal of Mathematical Trends and Technology (IJMTT). V10:26-33 June 2014. ISSN:2231-5373. www.ijmttjournal.org. Published by Seventh Sense Research Group.

Vote security, secrecy and confidence are necessary in any electoral process. Electronic voting is one of the most valuable exploratory areas for the pursuance of a secure e-Government transaction environment. This system is increasingly used in electoral processes ranging from specialized stand alone machines, up to complete paperless and remote voting system. Therefore this system has to follows a very complex set of security protocols. This paper analysis several algorithms to implement an electronic voting systems and discusses with a view to voter anonymity and proper protection from manipulations.


1. Abo-Rizka M., and Ghounaim H. (2007). A Novel in E-voting in Egypt. IJCSNS International Journal of Computer Science and Network Security, VOL.7, No.11. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.
2. Andrea Huszti (2011). A homomorphic encryption-based secure electronic voting scheme. Faculty of Informatics. University of Debrecen. Hungary.
3. Cabello A.B. Pardos, Hernández A. Encinas , Hoya S. White, Martín A. del Rey and Rodríguez G. Sánchez (2007). A Simple Protocol for Yes-No Electronic Voting. IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.7, July 2007.
4. Chaum D. (1982). Blind Signatures for Untraceable Payments, CRYPTO '82, Plenum Press, 1982,199-203.
5. Chaum D. (1981). Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM 24(2), 1981, 84-88.
6. Cramer R., Gennaro R., Schoenmakers B. (1997). A secure and optimally efficient multi-authority election schem.” Advances in Cryptology-Eurocrypt 97, LNCS vol. 1233, 103-118, 1997.
7. Fujioka Atsushi, Tatsuaki Okamoto, and Kazuo Ohta (1992). A practical secret voting scheme for large scale elections. In ASIACRYPT ’92: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, pages 244–251, London, UK, 1992. Springer-Verlag.
8. Fujioka A, T. Okamoto, K. Ohta (1993). “A practial secret voting scheme for large scale elections” Advances in Cryptology-Asiacrypt 92, LNCS vol. 718, pp. 248-259, 1993.
9. Goldwasser S., Micali S., and Rackoff C. (1989). The knowledge complexity of interactive proof systems. SIAM J. Comput., 18(1):186–208, 1989.
10. Hingo (2013). On cryptographic e-voting algorithms in general. OpenLife.cc (Open Life: The Philosophy of Open Source).
11. Jean-Jacques Quisquater, Louis Guillou, Marie Annick, and Tom Berson (1989). How to explain zero-knowledge protocols to your children. In CRYPTO ’89: Proceedings on Advances in cryptology, pages 628–631, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
12. Kalaichelvi And Dr. RM. Chandrasekaran (2011). Design And Analysis of Secured Electronic Voting Protocol. Journal of Theoretical and Applied Information Technology, Vol. 34 No.2.
13. Karlof C., Sastry N., and Wagner D. (2005). Cryptographic voting protocols: A Systems perspective, 14th USENIX Security Symposium, pp. 33-49.
14. Krishna Sampigethaya, Radha Poovendran (2006). A framework and taxonomy for comparison of electronic voting schemes. Computers & Security 25(2006)137–153. available at www.sciencedirect.com
15. Laure Fouard, Mathilde Duclos, and Pascal Lafourcade. Survey on Electronic Voting Schemes. VERIMAG, 2 avenue de Vignate, 38610 Grières, France.
16. Pankaj Kumar Malviya (2014) E-Voting System Using Cloud in Indian Scenario. International Journal of Engineering Science & Advanced Technology] ISSN: 2250-3676, Volume-3, Issue-3, 171-175.
17. Swaminathan B. and Cross Datson Dinesh J. (2012). Highly Secure Online Voting System with Multi Security using Biometric and Steganography. International Journal of Advanced Scientific Research and Technology Issue 2, Volume 2 ISSN: 2249-9954.
18. Triinu Mägi (2007). Practical Security Analysis of E-voting Systems. Master Thesis. Faculty of Information Technology. Department of Informatics. Tallinn University of Technology. Tallinn.
19. Zuzana Rjaskova (2002). Electronic Voting Schemes. PhD thesis, Comenius University, Bratislava, 2002.

Cryptography, Encryption-Decryption, Blind Signature, Zero Knowledge Proofs.