Implementation of Identity Based Encryption in e-Voting System
This paper explains about the design and implementation of Identity Based Encryption (IBE) in web-based Voting application. IBE is a completely new approach to the problem of encryption which was found on the traditional Public Key Infrastructure. It can be used on any arbitrary string as a pub...
| Main Authors: | Selamat, S. R., Yusof, R., Kong, P. R |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/184/ http://eprints.utem.edu.my/id/eprint/184/1/IBE_in_e-Voting_System.pdf |
Similar Items
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020)
by: Chin, Hsin Tien
Published: (2020)
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
by: Lee, Feng Wei
Published: (2022)
by: Lee, Feng Wei
Published: (2022)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
Data encryption in e-counselling system (DEECS)
by: Athirah Fayyadhah, Othman
Published: (2009)
by: Athirah Fayyadhah, Othman
Published: (2009)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
A smart card (MyKad) and fingerprint authentication for e-voting system
by: Ismail, Rosli, et al.
Published: (2022)
by: Ismail, Rosli, et al.
Published: (2022)
University E-voting System Utilizing Blockchain Technology and Zero-Knowledge Proofs
by: Lim, Aun Xian
Published: (2022)
by: Lim, Aun Xian
Published: (2022)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Towards Implementing a Privacy Policy:
An Observation on Existing Practices in
Hospital Information System
by: Ahmad , R.
Published: (2011)
by: Ahmad , R.
Published: (2011)
Validation of Vote Counting Supervision Based on Vote Tally at West Bangka District
by: Ekariva Annas, Asmara, et al.
Published: (2022)
by: Ekariva Annas, Asmara, et al.
Published: (2022)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
Fishing for Malay votes
by: Abdul Rahim, Rahimi, et al.
Published: (2021)
by: Abdul Rahim, Rahimi, et al.
Published: (2021)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Feasibility study on using MCDM for e-voting
by: Rozlina, Mohamed, et al.
Published: (2022)
by: Rozlina, Mohamed, et al.
Published: (2022)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
Single core hardware module to implement encryption in TECB mode
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007)
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007)
Design and implementation of advanced encryption standard using verilog HDL
by: Shamsiah, Suhaili, et al.
Published: (2022)
by: Shamsiah, Suhaili, et al.
Published: (2022)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Modeling the influence of information technology (IT) adoption factors on the electronic voting (E-Voting) technology using partial least squares-structural equation model (PLS-SEM) methods
by: Salimonu, I.R., et al.
Published: (2014)
by: Salimonu, I.R., et al.
Published: (2014)
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
by: Salam, M., et al.
Published: (2015)
by: Salam, M., et al.
Published: (2015)
Spacer Effect Caused by Azobenzene System in E/Z Isomerization: An Application for Optical Storage Device
by: Yuvaraj, A. R., et al.
Published: (2015)
by: Yuvaraj, A. R., et al.
Published: (2015)
The question of Identity between the restorative and regenerative organ transplantations
by: Shogar, Ibrahim, et al.
Published: (2018)
by: Shogar, Ibrahim, et al.
Published: (2018)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Similar Items
-
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020) -
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
by: Lee, Feng Wei
Published: (2022) -
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006) -
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019) -
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)