Electronic Voting using Identity Based Cryptography

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Today voting processes are the most important element of democracy as the societys way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols. Most of them use a Public Key Infrastructure. In this paper, we propose the use of Bilinear Pairings, first implementation of Identity Based Cryptography, in order to provide stronger security requirements than protocols based on Public Key Infastructure and without requiring the entire infrastructure needed by them. We make a comparative analysis of our proposal with previous proposals, which is based on the total number of needed key pairs and required authorities by those protocols.

Original languageEnglish
Title of host publication4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010
Subtitle of host publicationThe 1st International Conference on Technical and Legal Aspects of the e-Society
Pages31-36
Number of pages6
DOIs
StatePublished - 2010
Event4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010: 1st International Conference on Technical and Legal Aspects of the e-Society - St. Maarten
Duration: 10 Feb 201016 Feb 2010

Publication series

Name4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010: The 1st International Conference on Technical and Legal Aspects of the e-Society

Conference

Conference4th International Conference on Digital Society, ICDS 2010, Includes CYBERLAWS 2010: 1st International Conference on Technical and Legal Aspects of the e-Society
CitySt. Maarten
Period10/02/1016/02/10

Keywords

  • Bilinear maps
  • Electronic voting
  • Identity based cryptography
  • Public key cryptography

Fingerprint

Dive into the research topics of 'Electronic Voting using Identity Based Cryptography'. Together they form a unique fingerprint.

Cite this