Visible to the public Group signature entanglement in e-voting system

TitleGroup signature entanglement in e-voting system
Publication TypeConference Paper
Year of Publication2014
AuthorsAlshammari, H., Elleithy, K., Almgren, K., Albelwi, S.
Conference NameSystems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island
Date PublishedMay
Keywordsauthentication, ballots, cheating purposes, database, digital signatures, e-voting system, eavesdropping, Electronic voting, entangled state, Entanglement, group signature entanglement, man-in-the-middle attack, politics, Protocols, quantum computing, Quantum entanglement, Qubit, Receivers, replay attack, security of data, security system
Abstract

In any security system, there are many security issues that are related to either the sender or the receiver of the message. Quantum computing has proven to be a plausible approach to solving many security issues such as eavesdropping, replay attack and man-in-the-middle attack. In the e-voting system, one of these issues has been solved, namely, the integrity of the data (ballot). In this paper, we propose a scheme that solves the problem of repudiation that could occur when the voter denies the value of the ballot either for cheating purposes or for a real change in the value by a third party. By using an entanglement concept between two parties randomly, the person who is going to verify the ballots will create the entangled state and keep it in a database to use it in the future for the purpose of the non-repudiation of any of these two voters.

URLhttps://ieeexplore.ieee.org/document/6845186
DOI10.1109/LISAT.2014.6845186
Citation Key6845186