An efficient mobile voting system security scheme based on elliptic curve cryptography

Tohari Ahmad*, Jiankun Hu, Song Han

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

28 Citations (Scopus)

Abstract

The wide-spread use of mobile devices has made it possible to develop mobile voting system as a complement to the existing electronic voting system. However, due to limited onboard resource, it is challenging to achieve both efficiency and security strength for mobile voting system. Conventional solution is to either use symmetric encryption algorithms or hybrid symmetric and asymmetric algorithms at the expense of weaker security strength. In our proposed mobile voting scheme, the users' votes are secured by using the elliptic curve cryptography (ECC) algorithm. ECC is chosen as it has smaller key size than other public key cryptographies; and its homomorphic encryption property which is able to keep users' anonymity. We evaluate the method of ECDH with AES and ECC in comparison with our proposed method. The experiment demonstrates that our proposed ECC-based scheme can outperform the traditional hybrid symmetric and asymmetric cryptographic scheme in the context of mobile e-voting environment.

Original languageEnglish
Title of host publicationNSS 2009 - Network and System Security
Pages474-479
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 3rd International Conference on Network and System Security, NSS 2009 - Gold Coast, QLD, Australia
Duration: 19 Oct 200921 Oct 2009

Publication series

NameNSS 2009 - Network and System Security

Conference

Conference2009 3rd International Conference on Network and System Security, NSS 2009
Country/TerritoryAustralia
CityGold Coast, QLD
Period19/10/0921/10/09

Keywords

  • Cryptography
  • ECC
  • Mobile voting
  • Security

Fingerprint

Dive into the research topics of 'An efficient mobile voting system security scheme based on elliptic curve cryptography'. Together they form a unique fingerprint.

Cite this