An authorization-based cryptographically secure mobile voting system

dc.contributor.author Murat Odemis
dc.contributor.author Ahmet Hasan Koltuksuz
dc.contributor.author Odemis, Murat
dc.contributor.author Koltuksuz, Ahmet
dc.contributor.editor M. Scanlon , N.-A. Le-Khac
dc.date.accessioned 2025-10-06T17:52:01Z
dc.date.issued 2017
dc.description.abstract Governments and the private sector keep pace with the innovations on mobile technologies. Most countries have developed e-Government portals for their citizens which also have mobile applications. They aim to provide public services in efficient and effective manners. While the governments are administering existing duties through an electronic platform they are also trying to transform the paper-based voting into a fertile electronic method. Recent advancements in mobilebased communication networks and cryptography have made it possible to consider mobile voting as a feasible alternative for conventional elections. Mobile voting has the flexibility of allowing citizens to participate in an election no matter where they physically are. Benefits of this alternative may include a reduced cost and increased participation speed flexibility and accuracy as well as improved accessibility for disabled people. According to Chung and Wu (2012) mobile voting schemes should all have anonymity eligibility fairness mobility uniqueness verifiability uncoercibility limited transparency and appropriate location freedom. While previously published papers in the field of mobile voting has been scrutinized in this work this paper itself proposes for a reliable secure authorization-based mobile voting system which will enable instantaneous vote submissions for not only the government elections but also for institutions and meetings which currently lack such a favorable arrangement. A mobile application was also developed to prove the system. Hybrid cryptosystem is used for data security and the data gets encrypted and decrypted via AES-256. Elliptic Curve Diffie-Hellman schema called Curve25519 (Bernstein 2006) is used for the key exchange mechanism for Curve25519 provides one of the fastest results. In addition to this biometric fingerprint-scanning technology is used. One of the most important features of the system is that after user enters to the system with his institutive credential if and when under pressure voter can use the fake trapdoor. The user sets both genuine and fake character-based password and geometric pattern password to vote. The network is protected by SSL and OpenSSL is used on certification phases. The application consists of a login certification activation listing election and a voting screen. An Authorization-Based Cryptographically Secure Mobile Voting System will be introduced in this paper. © 2023 Elsevier B.V. All rights reserved.
dc.identifier.isbn 9781912764617, 9781914587405, 9781627489089, 9781910810286, 9781912764280, 9781914587702, 9781910309247, 9781911218852, 9781910810934, 9781911218432
dc.identifier.isbn 9781911218432
dc.identifier.issn 20488602, 20488610
dc.identifier.issn 2048-8602
dc.identifier.scopus 2-s2.0-85027997150
dc.identifier.uri https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027997150&partnerID=40&md5=a936eb1124d2271cce6ffe2ee406e031
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/9723
dc.language.iso English
dc.publisher Curran Associates Inc.
dc.relation.ispartof 16th European Conference on Cyber Warfare and Security ECCWS 2017
dc.rights info:eu-repo/semantics/closedAccess
dc.source European Conference on Information Warfare and Security ECCWS
dc.subject Authorization Based Voting, Cordova, Curve25519, Ecdh Key Exchange, Electronic Voting, Fake Password, Faster Mobile Key Exchange, Fingerprint, Hybrid Cryptosystem, Mobile Application Security, Mobile Voting, Authorization, Cryptography, Government Data Processing, Mobile Computing, Voting Machines, Authorization Based Voting, Cordovum, Curve25519, Ecdh Key Exchange, Electronic Voting, Fake Password, Fast Mobile Key Exchange, Fingerprint, Hybrid Cryptosystem, Key-exchange, Mobile Application Securities, Mobile Voting, Authentication
dc.subject Authorization, Cryptography, Government data processing, Mobile computing, Voting machines, Authorization based voting, Cordovum, Curve25519, ECDH key exchange, Electronic voting, Fake password, Fast mobile key exchange, Fingerprint, Hybrid cryptosystem, Key-exchange, Mobile application securities, Mobile voting, Authentication
dc.subject Mobile Voting
dc.subject Authorization Based Voting
dc.subject Cordova
dc.subject ECDH Key Exchange
dc.subject Faster Mobile Key Exchange
dc.subject Hybrid Cryptosystem
dc.subject Fingerprint
dc.subject Electronic Voting
dc.subject Fake Password
dc.subject Mobile Application Security
dc.subject Curve25519
dc.title An authorization-based cryptographically secure mobile voting system
dc.type Conference Object
dspace.entity.type Publication
gdc.author.scopusid 57195415972
gdc.author.scopusid 13408802300
gdc.coar.type text::conference output
gdc.description.department
gdc.description.departmenttemp [Odemis M.] Department of Computer Engineering, Yaşar University, Turkey; [Koltuksuz A.] Department of Computer Engineering, Yaşar University, Turkey
gdc.description.endpage 281
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
gdc.description.startpage 274
gdc.description.volume 0
gdc.index.type Scopus
gdc.scopus.citedcount 0
gdc.virtual.author Ödemiş, Murat
gdc.virtual.author Koltuksuz, Ahmet Hasan
oaire.citation.endPage 281
oaire.citation.startPage 274
person.identifier.scopus-author-id Odemis- Murat (57195415972), Koltuksuz- Ahmet Hasan (13408802300)
publicationvolume.volumeNumber 0
relation.isAuthorOfPublication 06bfcd18-b51a-435f-bda8-5a840c61bfbc
relation.isAuthorOfPublication 0a146451-eb5a-43c9-bfca-979da9ee51d7
relation.isAuthorOfPublication.latestForDiscovery 06bfcd18-b51a-435f-bda8-5a840c61bfbc
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files