Search In this Thesis
   Search In this Thesis  
العنوان
Digital Signature for a Secure Electronic Voting Scheme /
المؤلف
Ramadan, Eman Mohamed.
هيئة الاعداد
باحث / Eman Mohamed Ramadan
مشرف / Aliaa Abd El Haleem Yossef
مشرف / Ashraf Abd El Fatah Darwish
مشرف / Maged Abd El Latif El Gendy
مشرف / Maged Abd El Latif El Gendy
الموضوع
Computer scince.
تاريخ النشر
2019.
عدد الصفحات
I-VII, 114 p. :
اللغة
العربية
الدرجة
ماجستير
التخصص
العلوم الزراعية والبيولوجية
الناشر
تاريخ الإجازة
1/1/2019
مكان الإجازة
جامعة حلوان - كلية العلوم - Statistics and Computer Science
الفهرس
يوجد فقط 14 صفحة متاحة للعرض العام

from 112

from 112

المستخلص

6.1 Conclusion
The goal of our work is to design a scheme more effective than the schemes in chapter four and achieving the same or higher security properties.
The aim is to design a scheme in such a way that improper behavior of the voter will be detected, and invalid or double- votes will not be taken into account. Usually, the voter is required to prove that his vote is off the correct form without disclosing any other information about his vote.
In our proposed scheme we apply the bind signature technique that has the following three properties. First, it must be unique; the signature of different parties must be different. Second, the signature must be forgeable. Third, the blind signature needs to be verifiable, so anyone can confirm the authenticity. Our proposed scheme implements bind signatures with using RSA public key cryptosystem.
Electronic voting can involve remote transmission of ballots via telephones or private computer networks, and the latest development is voting over internet.
With growing usage of computers there is also an increasing amount of both private and governmental services available via the internet. The internet can be used for economic transactions, tax forms, and university admission services. etc., and as a consequence a development into being able to provide voting via the internet is also considered.
Electronic voting technology can speed up the counting of ballots and provide improved accessibility for disable voters.
A voting system providing remote voting via the internet could improve the accessibility and provide more convenient voting process.
The promises of accuracy, security and precision have driven electronic voting system forward.
Remote internet voting systems is now developing into being categorized as cryptographic voting systems, not only to provide the sufficient secrecy but also to provide possibilities of verification.
The purpose of cryptographic verifiable voting system is to prevent incorrect recording and tallying, by making the processes verifiable for everyone.
An internet system is vulnerable to more and new threats, fraud, compromised computers, attackers compromising system components or other attacks launched over the network. The need for better mechanisms of authentication, anonymity, integrity, confidentiality, secrecy etc., is crucial.
With the development of internet voting systems, the need for cryptographic means both for providing security against these threats and for verification against these threats and for verification purpose is increasing.
The possibility of verifying several steps of the processes is an important mean to detect and counter several attacks.
The NIST had a workshop called end-to-end verifiable voting systems, which is an improvement of verification in voting systems.
Voting over the internet can be done from remote locations using a computer connected to the internet. But when referring to internet voting in this thesis we mean voter cast from a remote location, for instance through the web browser of your home computer, via the internet. These internet voting systems are also called cryptographic voting systems.
To vote over the internet the voter needs a digital signature to log into the system, for instance identify himself with a PIN code and a smart card from electronic certification authority like certification authority of the government (Gov-CA) that hosted in the ministry of finance. The voter submits his choice and the encrypted ballot is transmitted over the internet to a remote server of the election system.