Search
Close this search box.

Authors: Abdulwasiu Kailani AbdulRahim,Olusegun Folorunso,Sushil K. Sharma
International Journal of E-Adoption, 3(3), 44-61, July-September 2011

Abstract
Electronic voting—the use of computers or computerized voting equipment to cast and tabulate and tally ballots in an election in a trustable manner—is a pillar of e-Government.

The DynaVote voting protocol system proposed by Cetinkaya and Koc (2007) is assumed secure and practicable on a network. However, the DynaVote e-Voting protocol does not completely protect the voting counter against impersonated votes, especially when the pseudo-Vote identities are known by the wrong voter or compromised by authorities. To address this problem, a prototype called improved DynaVote e-Vote protocol was designed to protect the counter from anomalies associated with counting impersonated votes (multiple votes) in the same election. This was achieved by introducing biometric fingerprint and pseudo voter identities (PVID) encryption for each voter during voter registration via online or data mining of population data containing fingerprint biometrics. Furthermore, fingerprint reader and RSA public key cryptography is used in PVID to eliminate counting impersonated votes. The performance results showed that improved DynaVote e-Vote protocol is more reliable, eligible, and accurate, and protects voter privacy against other e-Vote protocols.


Download PDF

 

Times Higher Education (THE)
World University Rankings (WUR) for 2024

rANKING OF UniversitIES of Agriculture

1ST IN aFRICA | 7TH gLOBALLY

30th Convocation Ceremonies

Award of First Degree to deserving graduands

Days
Hours
Minutes
Seconds