Secured and Auditable Cryptography for Electronic Voting

Main Article Content

Zulkarnaim Masyhur
Firmansyah Ibrahim
Asep Indra Syahyadi

Abstract

Dengan adanya Electronic Voting (e-voting) diharapkan dapat menggantikan sistem pemungutan suara konvensional yang telah ada sebelumnya. Pada sistem e-voting ini menggunakan konsep Pret a Voter yang menggunakan skema paper ballot e-voting. Skema ini menggunakan Public Key Infrastructure (PKI). Skema yang diusulkan menggunakan paper ballot e-voting dengan pertimbangan telah popular di kalangan masyarakat, tetapi didukung oleh protokol enkripsi yang kuat untuk menjamin vote secrecy dan anonymity dari pemilih. Aspek verifiability dari suatu system e-voting juga merupakan hal fundamental. Sistem e-voting menggunakan system protocol mixnets dengan kompleksitas security cukup baik. 

Article Details

How to Cite
[1]
Z. Masyhur, F. Ibrahim, and A. I. Syahyadi, “Secured and Auditable Cryptography for Electronic Voting”, INSYPRO, vol. 5, no. 2, Nov. 2020.
Section
General

References

Cetinkaya, O., & Cetinkaya, D. (2007). Verification and validation issues in electronic voting. The Electronic Journal of E-Government, 5(2), 117–126. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.155&rep=rep1&type=pdf
Kremer, S., Ryan, M., & Smyth, B. (2010). Election verifiability in electronic voting protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6345 LNCS, 389–404. https://doi.org/10.1007/978-3-642-15497-3_24
Masyhur, Z. (2017). Desain dan Implementasi Mekanisme Verifikasi Pada Single Ballot E-Voting. Bandung Institute of Technology.
Masyhur, Z., & Rahardjo, B. (2018). E-Voting Verification. Prosiding - Seminar Nasional Teknik Elektro UIN Sunan Gunung Djati Bandung, 185–193. //senter.ee.uinsgd.ac.id/repositori/index.php/prosiding/article/view/senter2016p22
Mursi, M. F. M., Assassa, G. M. R., Abdelhafez, A. A., & Abosamra, K. M. (2016). A Secure and Auditable Cryptographic-Based e-Voting Scheme. Proceedings - 2015 2nd International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2015, 253–262. https://doi.org/10.1109/MCSI.2015.16
Rehman, A. U., Abbasi, A. Z., & Shaikh, Z. A. (2008). Building a smart university using RFID technology. Proceedings - International Conference on Computer Science and Software Engineering, CSSE 2008, 5, 641–644. https://doi.org/10.1109/CSSE.2008.1528
Ryan, P. Y. A., Bismark, D., Heather, J., Schneider, S., & Xia, Z. (2009). Pr̂t à voter: A voter-verifiable voting system. IEEE Transactions on Information Forensics and Security, 4(4), 662–673. https://doi.org/10.1109/TIFS.2009.2033233
Suharsono, T. N., Kuspriyanto, K., & Rahardjo, B. (2019). Verifiability Metric Notion in e-Voting System. TSSA 2019 - 13th International Conference on Telecommunication Systems, Services, and Applications, Proceedings, 164–167.