Internati
o
nal
Journal of Ele
c
trical
and Computer
Engineering
(IJE
CE)
V
o
l.
6, N
o
. 3
,
Ju
n
e
201
6, p
p
. 1
197
~ 12
04
I
S
SN
: 208
8-8
7
0
8
,
D
O
I
:
10.115
91
/ij
ece.v6
i
3.9
449
1
197
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJECE
FPF: Fraud Proof Framework fo
r Electronic Voting System
Innoce
nt K
a
b
a
nd
an
a
1
, A.
N.
N
a
nd
a Kum
a
r
2
1
Departmenr of
CS&E, Schoo
l o
f
Engin
eering
an
d Te
chnolog
y
,
J
a
in Univ
ersity
G
l
obal Campus, I
ndia
2
R.L. Jal
a
ppa In
stitute of
Te
chno
log
y
, Doddab
a
l
l
a
pur,
India
Article Info
A
B
STRAC
T
Article histo
r
y:
Received Nov 17, 2015
Rev
i
sed
D
ec 26
, 20
15
Accepte
d
Ja
n 10, 2016
In a democr
atic
process voting p
l
ay
s
a v
ita
l rol
e
i
n
selec
tion of
po
lic
y
as wel
l
as candid
a
tes. V
o
ting though g
i
v
e
s the fr
ee
dom to voter
to cast his opinion it
is not free fr
aud
u
lent. In order to have secur
e
v
o
ting and conv
ey
th
e opinion
of authorized voter in this paper we
have presented a java based
framework
for fraud proof
electronic votin
g s
y
stem. In this framework we ensure that
onl
y
the
authori
zed vot
er is per
m
itted to
cast h
i
s vote and m
i
t
i
g
ate
ill
ega
l
voters cast votes
on faking or pr
etend
i
ng to be s
o
meone else. Pr
oposed FPF
provides
a m
u
lti
-leve
l
of auth
ent
i
ca
tion m
echan
is
m
to validat
e the
voter.
Th
e
proposed s
y
stem
is tested for
efficien
cy
and
robu
stness in compar
ing it with
the
existing
s
y
stem and is found
to be
efficient
th
rough comparative an
aly
s
is.
At present FPF
is successful in mitiga
ting th
e u
n
authorized voting further
enhanc
em
ent in
the
el
ectron
i
c
voting s
y
s
t
em
is
being
carr
i
ed o
u
t as
futu
r
e
work.
Keyword:
Aut
h
entication
C
l
ou
d c
o
m
put
i
n
g
Electr
o
n
i
c vo
tin
g
En
cry
p
tio
n
Mu
lti-lev
e
l au
t
h
en
tication
Copyright ©
201
6 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
In
n
o
cent
Ka
ba
nda
na,
Depa
rt
m
e
nr
o
f
C
S
&E,
Sch
ool
o
f
E
ngi
neeri
n
g
an
d T
e
chn
o
l
o
gy
,
Jain
Uni
v
ersity Global Cam
p
us, India.
Em
ail: innocentkaba
nda
na
123@gm
ail.co
m
1.
INTRODUCTION
El
ect
i
ons
hav
e
a l
o
ng
hi
st
or
y
,
di
f
f
ere
n
t
pa
rt
o
f
t
h
e
w
o
rl
d f
o
l
l
o
we
d
di
f
f
ere
n
t
m
e
t
hods
fo
r el
ect
i
n
g
represe
n
tatives
. In a Dem
o
cratic nation elections are c
o
nsidere
d
as the
key factor
s f
o
r
t
h
e gr
owt
h
of
t
h
e
nat
i
o
n
as i
t
pr
ovi
des t
h
e
vot
er wi
t
h
op
p
o
rt
uni
t
y
be
a
par
t
of
t
h
e
p
o
l
i
c
y
m
a
ki
ng an
d
nat
i
o
n
b
u
i
l
d
i
n
g.
The
pr
ocess
o
f
el
ect
i
on i
n
v
o
l
v
es
co-
o
rdi
n
at
i
o
n
of
di
f
f
ere
n
t
m
echani
s
m
s
i
nvol
vi
n
g
t
h
e
re
gi
st
rat
i
o
n
o
f
t
h
e
vot
er
,
regi
st
rat
i
o
n
of
t
h
e can
di
dat
e
s
and sc
r
u
t
i
n
i
z
i
ng t
h
e i
n
fo
rm
at
i
on p
r
ovi
ded
by
t
h
e v
o
t
e
r a
s
wel
l
as can
d
i
dat
e
s.
Co
llab
o
rating
th
ese info
rm
ati
o
n, m
a
in
tain
in
g
co
nfid
en
tiality o
f
th
ese info
rm
atio
n
and
co
ndu
ctin
g a
free an
d
fai
r
el
ect
i
o
n
t
u
rns t
o
be a t
e
di
ous
p
r
o
cess.
In
or
de
r t
o
ha
ve
a free a
n
d fai
r
el
ect
i
on n
o
l
o
o
p
h
o
l
e
s i
n
any
of t
h
e
m
echanism
shoul
d
be allowe
d, i
n
failing to
do so will
fail
the m
o
to of the dem
o
cr
acy. In
order to
overcom
e
these c
h
allenges and
with the adva
ncem
ent of tec
h
nology
also t
h
e
nee
d
to
reduce
cos
t
, im
prove
sec
u
rity,
efficiency a
n
d reduce
hum
a
n interface
ga
ve
rise to t
h
e ide
a
of Electronic
voting.
W
i
t
h
the m
o
re and
m
o
re
co
un
tries
op
tin
g fo
r d
e
m
o
cratic way of
electin
g
rep
r
e
s
entatives
has
also res
u
lted i
n
em
erging of ne
w
techniques in
voting. From
the pr
edate
d
techni
que of publiclyacclaimi
ng the
vote to recent m
echanism
of
bal
l
o
t
pa
per
v
o
t
i
n
g
t
h
ere
ha
s bee
n
t
r
em
endo
us e
n
hanc
emen
t in
vo
ting
system
[1
].
W
ith
th
e growth
i
n
i
n
f
o
rm
at
i
on t
e
chn
o
l
o
gy
an
d i
n
t
e
rnet
ne
w t
echni
que
s l
i
k
e el
ect
roni
c vot
i
ng i
s
i
n
t
r
o
duc
ed i
n
m
a
ny
di
ffe
ren
t
cou
n
tries.
Earli
e
r electro
nic
v
o
ting
wa
s
just
refe
rre
d to
the use of
electronic
voting
m
achine in t
h
e
proc
ess of
vot
i
n
g.
W
i
t
h
t
i
m
e
s di
ffe
rent
ap
pr
oac
h
es
were
ex
pe
ri
m
e
nt
ed
t
o
e
s
t
a
bl
i
s
h a
sec
u
re
d
el
ect
oral
sy
st
e
m
and
i
n
crease t
h
e i
n
vol
vem
e
nt
of t
h
e ci
t
i
zen i
n
na
t
i
on
bui
l
d
i
n
g.
E-voting ca
n
be c
o
nsider as
a voting syst
e
m
whe
r
ein
t
h
e d
a
ta
related
to
electio
n are sto
r
ed
and
p
r
o
cessed
as d
i
g
ital in
fo
rm
ati
o
n. Th
e m
a
in
ob
j
ective
o
f
e-vo
tin
g is, it shou
ld
b
e
co
m
p
lian
t
with election
ru
les
an
d
law and
m
u
st p
r
o
v
i
d
e
v
o
t
in
g
op
portun
ity
to
all
au
t
h
ori
zed
v
o
t
er wh
ereb
y
m
i
t
i
g
a
tin
g
illeg
a
l
v
o
t
ers or
fak
e
v
o
t
ers’vo
tin
g
fo
llo
ws th
e same trad
itio
n
a
l
way o
f
v
o
ting
wh
ich
u
s
es th
e au
th
en
ticatio
n
of vo
ter, m
a
in
tain
in
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJEC
E
V
o
l
.
6,
No
. 3,
J
u
ne 2
0
1
6
:
11
9
7
– 12
04
1
198
p
r
i
v
acy of
th
e vo
te and
so
on
w
h
ic
h are
a
c
hieve
d
in m
o
re s
o
phisticated
as
well adva
nce
way. Elec
tronic
voting offe
rs
many advanta
g
es suc
h
as it allows ha
vi
ng fast and accurate res
u
lt. It reduces the
use of
man
p
o
wer. It help
s in
in
creasi
n
g
th
e invo
lv
emen
t o
f
m
o
re
an
d
m
o
re citiz
en
in
th
e electo
r
alsystem
[2
]. It also
helps i
n
re
duci
ng t
h
e tim
e
cost conducting t
h
e election.
It
allows in
buil
d
ing trust am
ong the citizen a
b
out
free and
fair electio
n
.
It p
l
ay
s a v
ital ro
le i
n
redu
ci
ng m
a
lpractice and c
o
rruptio
n in the electoralproc
ess.
Th
ou
g
h
el
ect
ro
ni
c vot
i
n
g sy
st
em
offers ce
rt
ai
n adva
nt
a
g
es i
t
i
s
al
so pro
n
e t
o
di
ffe
re
nt
ki
n
d
o
f
di
sad
v
a
n
t
a
ge
s
.
In
sp
ite o
f
th
e ad
v
a
n
t
ag
es o
ffered
b
y
th
e electron
i
c v
o
ting
syste
m
,
man
y
critics b
e
liev
e
th
at th
e p
r
o
b
l
em o
f
in
equ
a
lity an
d secu
rity prevail in
larg
e in
electro
n
i
c
v
o
t
i
n
g
system
. They also
argu
e
th
at p
e
op
le wi
th
lo
w
wage m
i
ght not be a
b
le the
afford the syst
e
m
as th
ey
might
have less
access to the s
y
ste
m
and los
e
their
pri
v
ilege
of voting. In som
e
devel
opi
ng
c
o
unt
ries whe
r
e the
accessi
bilit
y
of the
system
is uneve
n it
m
i
ght
also
resu
lt i
n
l
o
w turnou
t in th
e
ov
erall
v
o
t
i
n
g
p
r
o
cess
causin
g
th
e p
e
op
le to
stay ou
t
of th
e
v
o
ting
[3]. Th
e
main
d
r
awb
a
ck
critics h
a
v
e
i
d
en
tified
in
electron
i
c syste
m
is th
e secu
rity syste
m
, as tech
n
o
l
o
g
y
is adv
a
n
c
ing
it is also posing m
o
re and m
o
re t
h
reats t
o
electronic
syst
e
m
failing to
address t
h
ese i
ssues m
i
ght re
sult in
failu
re
of th
e to
tal syste
m
.
Th
e fo
llowing sectio
n
is o
r
g
a
n
i
zed
as fo
llo
ws in
section
II
we d
i
scuss ab
ou
t th
e ex
istin
g
work
carri
ed
out
by
di
ffere
nt
aut
h
ors i
n
t
h
e el
ect
ro
ni
c vot
i
n
g dom
ai
n. In se
ct
i
on II
I we d
i
scuss ab
out
p
r
o
b
l
e
m
d
e
scri
p
tio
n prev
ailin
g
i
n
th
e ex
istin
g
system e
m
p
h
a
sizin
g
m
o
re on
secu
rity asp
ect.
Sectio
n
IV illu
strates
abo
u
t
arc
h
i
t
ect
ure
of p
r
op
ose
d
FPF
.Sect
i
o
n V pr
o
v
i
d
es t
h
e
det
a
i
l
s
about
t
h
e im
pl
em
ent
a
t
i
on o
f
t
h
e pr
o
pos
e
d
syste
m
. Section VI discusses
about
the perform
ance analysis of the prop
ose
d
syste
m
. Section VII
discusses
ab
ou
t th
e con
c
l
u
sion
t
o
proposed
system
.
1.
1.
Back
ground
In t
h
i
s
sect
i
o
n
we di
scus
s abo
u
t
va
ri
o
u
s t
echni
que
s an
d
m
echani
s
m
s
use
d
by
di
f
f
er
ent
aut
h
ors i
n
im
pl
em
ent
i
ng t
h
e exi
s
t
i
ng el
ect
ro
ni
c vot
i
n
g sy
st
em
. The am
bi
gui
t
y
i
n
deci
di
n
g
whet
her t
o
use
or
not
use
electro
n
i
c vo
tin
g
still p
e
rsists in
certain
p
a
rt
o
f
th
e wo
rld. Man
y
researchers h
a
v
e
p
u
t
forward
th
eir
v
i
ews in
this rega
rd
on
e such
wo
rk is
carried M
a
tejTrav
n
icek
[4]
per
f
o
r
m
e
d anal
y
s
i
s
consi
d
eri
ng
vari
ous as
p
ect
s of
voting a
n
d
has
suggeste
d that
it can re
duce
fe
w iss
u
es as
wel
l
as gi
ve ri
se
t
o
som
e
new
cha
l
l
e
nges as
wel
l
.
The aut
h
o
r
has
concl
u
de
d t
h
a
t
t
h
ere i
s
no un
i
v
ersal
an
swer
for ju
stify th
e u
s
e of electronic voting
or
op
p
o
si
n
g
i
t
.
It
com
p
l
e
t
e
l
y
depen
d
s
on t
h
e
n
a
t
u
re o
f
i
t
s
de
pl
oy
m
e
nt
based o
n
t
h
e res
p
e
c
t
i
v
e el
ect
oral
desi
g
n
.
Di
ffe
re
nt
co
un
t
r
i
e
s use di
ffe
r
e
nt
m
e
t
hod
s o
f
el
ect
roni
c
vot
i
ng
o
n
e suc
h
w
o
r
k
i
s
bei
ng ca
rri
ed
o
u
t
by
C
h
aei
kar
et al [5] pe
rform
e
d the anal
ysis of electronic voting
sy
s
t
em
s i
n
di
ffe
r
e
nt
pa
rt
s
of
Eu
rop
eanun
ion
’
s su
ch
Estonia, Ge
rmany,Ireland,
UK
,
Switzerlan
d
and
Belg
i
u
m
.
The
a
u
thors ha
ve perform
ed an
a
n
alysis
of their w
eakness
, technical c
h
a
r
acteristic in
orde
r t
o
assist
researc
h
er
s t
o
devel
op a
be
t
t
e
r un
derst
a
n
d
i
n
g t
h
e sy
stem an
d
to
prov
id
e so
lu
tion
to
cu
rren
t d
r
awb
a
ck
s
pre
v
ai
l
i
ng i
n
t
h
e sy
st
em
. Anot
he
r suc
h
wo
r
k
was ca
rri
e
d
out
by
Ac
hi
en
g an
d R
u
h
ode
[6]
pe
rf
orm
e
d a sur
v
ey
o
n
th
e ad
op
tion
an
d
ch
allenges th
at are
prev
ailin
g
i
n
electron
i
c vo
ting
tech
n
i
q
u
e
s in
con
t
ex
t to
Sou
t
h
Africa,
the s
u
rvey
was
carrie
d
out in
Cape
T
o
wn where
pe
ople ha
d access
to int
e
rn
et. T
h
e s
u
rvey was ca
rrie
d
in t
h
e
f
o
r
m
o
f
on
-
line q
u
e
stio
nn
air
e
. Th
e an
alysis
w
a
s
b
a
sed on
t
h
em
atic analysis as well as di
ffusion
of i
n
novation
th
eories th
at is ad
op
ted
fo
r theo
reti
cal analysis.Vari
o
us aut
h
ors
have
use
d
di
ffe
re
nt
t
ech
ni
q
u
es t
o
i
m
pl
em
ent
el
ect
roni
c
vot
i
ng
sy
st
em
one
suc
h
w
o
r
k
i
s
carri
ed
o
u
t
by
Lai
et
al
[7]
have
desi
gne
d
and
i
m
pl
em
ent
e
d
a
el
ect
roni
c v
o
t
i
ng sy
st
em
using c
ont
act
l
e
ss IC
card
.
Thi
s
can
b
e
u
s
ed
to su
ccessfu
lly i
d
en
tify th
e vo
t
e
r and
also
e
n
sure val
i
dity
of
t
h
e IC card.
1.
2.
The Problem
Th
is section
prov
id
es a
d
e
scrip
tion
related to
vari
ous
pr
obl
em
s pre
v
ai
l
i
ng i
n
t
h
e e
x
i
s
t
i
ng sy
st
em
.
Work carrie
d
by MatejTra
vnicek s
u
ggests
that th
e success of E-
v
o
t
i
n
g sy
st
em
depend
s on t
h
e
p
r
o
p
er
depl
oy
m
e
nt
of sy
st
em
as per the el
ect
oral
ne
ed. T
h
o
u
gh el
e
c
t
i
on p
r
oces
s i
s
a sim
i
l
a
r i
n
nat
u
re, i
t
di
ffe
rs
from
n
a
tio
n to
n
a
tion
in term
s o
f
co
m
p
lex
ity, i
m
p
l
em
en
tati
on and
co
st
.
Di
ffe
r
e
nt
ap
p
r
oac
h
es
ha
ve
been
f
o
l
l
o
w
e
d
by
di
ffe
re
nt
aut
h
ors t
o
i
m
pl
em
ent
el
ect
ron
i
c vot
i
n
g
system
.
Lai [7] has im
ple
m
ented
anelectronic voting
usi
n
g co
nt
act
l
e
ss IC
t
o
enha
n
ce t
h
e securi
t
y
. Si
nce IC
C
i
s
vul
nera
bl
e p
h
y
s
i
cal
dam
a
ge, and c
o
m
m
uni
cat
i
o
n
card
and reade
r
ca
n be hacke
d
.
1.
3.
The Proposed So
lut
i
on
Thi
s
sect
i
on
pr
ovi
des t
h
e det
a
i
l
s
about
t
h
e
pr
o
pos
e
d
sy
st
em
. It
di
scusses
abo
u
t
t
h
e vari
ous m
odul
e
p
r
esen
t in th
e desig
n
and
also
th
eir fun
c
tion
a
lities.
Reg
i
stratio
n
:
Here th
e
Ad
min
i
strato
r can
b
e
an
i
n
d
i
v
i
dual en
tity o
r
a Gov
e
rn
m
e
n
t
Ag
en
cy,
wh
ich
can
b
e
m
a
th
e
m
atically d
e
n
o
t
ed
as
F(R
)
.
Admin
i
strato
r
is
respo
n
s
i
b
le fo
r
p
e
rform
i
n
g
th
e in
itial fun
c
tion
su
ch
as re
gistering
the voters
and candidates.
It
is sim
ilar to
th
e
p
r
o
cess
fo
llo
wed
i
n
th
e co
nv
en
tio
n
a
l el
ectio
n
process
.
E
n
tire
re
gistration process is
controlled by t
h
e
Administrator.
On s
u
ccess
f
ul
re
gistration the
vote
r
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
FPF:
Fraud P
r
oof
Fr
amew
or
k for Electr
oni
c Voting
Syste
m
(Innoce
nt K
a
bandana)
1
199
and C
a
ndi
dat
e
i
s
al
l
o
wed t
o
l
o
gi
n, t
h
r
o
u
g
h
a secret
co
d
e
whi
c
h i
s
se
nt
t
o
con
cer
n
i
ndi
vi
d
u
al
t
h
ro
u
g
h
SMS,Em
ail and QRC
ode
so that the
vote
r
will receive the
c
ode
in
one
or
the ot
her
way
even if the
r
e e
x
ists a
pr
o
b
l
e
m
i
n
sy
st
em
. Whi
c
h t
h
ere can
per
f
o
r
m
l
a
tt
er ope
rat
i
ons s
u
c
h
as e
n
r
o
l
l
i
ng a
n
d v
o
t
i
n
g
?
A
not
her
cruci
a
l
ope
rat
i
o
n
per
f
o
rm
ed by
t
h
e
Adm
i
ni
st
rat
o
r
i
s
t
h
e
veri
fi
cat
i
on
o
f
Doc
u
m
e
nt
s. T
h
i
s
i
s
p
e
rf
orm
e
d t
o
el
im
i
n
at
e
fake
v
o
t
e
rs
or
u
n
aut
h
o
r
i
zed
vot
e
r
s. T
h
e
ve
ri
fi
cat
i
on
p
r
oc
ess i
s
ent
i
r
el
y
de
pen
d
e
n
t
o
n
t
h
e A
d
m
i
ni
strat
i
o
n
/Gov
t Ag
en
cy
wh
ich
p
e
rforms v
e
rificatio
n as p
e
r th
ei
r ru
les and
regu
lation
.
Wh
ere F(R)
=Ad
m
in
istrato
r
Co
n
t
ro
llin
g
fun
c
tio
n
V
(
R) =Vo
t
er reg
i
str
a
tio
n functio
n
C
(
R
)
=C
a
ndi
d
a
t
e
regi
st
rat
i
o
n
f
unct
i
o
n a
n
d
D (
V
) =
D
oc
um
ent
ve
ri
fi
cat
i
o
n
f
unct
i
o
n.
M
a
t
h
em
ati
ca
lly Ad
min
i
strato
r C
o
n
t
ro
ller is represen
ted as:
F(R)
←
V(R
)
+C(R)
+
D
(V
).
1.
3.
1.
Enrollment
On
Succes
sful
registration, t
h
e voter a
n
d the candi
date c
a
n enroll to Elec
tion system
through the
l
ogi
n t
h
ey
hav
e
been
gi
ve
n
by
t
h
e adm
i
ni
st
rat
o
r
.
He
re t
h
e v
o
t
e
r a
nd c
a
ndi
dat
e
s has
t
o
fu
r
n
i
s
h s
u
p
p
o
r
t
i
n
g
doc
um
ent
s
i
n
t
h
e f
o
rm
of
T
e
xt
fi
l
e
a
nd i
m
ages i
n
o
r
d
e
r to
ju
stify that th
e con
c
erned
ind
i
v
i
d
u
a
l
is th
e
authorize
d
vot
er or ca
ndidate
.
In cas
e o
f
t
h
e doc
um
ent
s
are not
val
i
d
or
aut
h
enticate one t
h
e a
d
m
i
nistrator ca
n
rej
ect the vo
ter o
r
cand
i
d
a
te as p
e
r th
e
ru
les
an
d reg
u
l
a
tion
.
Here th
ere is two
ways
o
f
enro
lling
on
e is
fo
r t
h
e
vot
e
r
an
d t
h
e ot
he
r i
s
for t
h
e candi
dat
e
. A pe
rq
ui
si
t
e
for a can
di
dat
e
i
s
t
h
at
he shoul
d be a re
gi
st
er
e
d
v
o
t
er
.A
nd
a ma
j
o
r
d
i
ff
e
r
en
c
e
b
e
tw
e
e
n
th
e vo
te
r
enr
o
llme
n
t and
th
e can
d
i
d
a
te en
ro
llm
en
t is th
at th
e can
d
i
d
a
te
n
eeds to reg
i
st
er to a
p
a
rty an
d ob
tain a sy
m
b
o
l
in
ord
e
r
to
co
n
t
est t
h
e
electio
n
.
On
the co
m
p
letio
n
o
f
the
en
ro
llm
en
t p
r
ocess b
y
t
h
e can
d
i
d
a
te an
d voter, all th
e d
e
t
a
ils in
clu
d
i
n
g
t
h
eir
p
e
rson
al
details alo
n
g
wi
th
th
e
sup
p
o
rt
i
v
e
doc
um
ent
s
fu
rni
s
h
e
d
by
t
h
em
i
s
fo
rwa
r
ded
t
o
t
h
e
Adm
i
ni
st
rat
o
r
C
o
nt
r
o
l
l
e
r
or
G
o
vt
A
g
e
n
cy
fo
r
v
a
lid
ation
.
On
l
y
o
n
th
e
su
ccess o
f
t
h
is v
a
lidatio
n
th
e
v
o
t
er an
d
cand
id
ate is facilitated
t
o
tak
e
p
a
rt in
n
e
xt
process
of Elec
tion. Ca
ndidate
enrollm
en
t can
be m
a
the
m
atically expresse
d as:
C(R)
←
P (D
) +D(R)
+S
(R).
Whe
r
e
P (
D
) =
P
ers
onal
det
a
il of Cand
id
ate or Vo
ter
D(R) =Su
ppo
rt
iv
e Do
cu
m
e
n
t
s to
Ju
stify th
e
Au
t
h
orizatio
n.
S(R
)
=
D
e
n
ot
es t
h
e Pa
rt
y
t
h
e c
a
ndi
dat
e
h
a
s e
n
r
o
l
l
e
d t
o
c
ont
est
el
ect
i
on.
1.
3.
2.
Architec
ture
of the
Syste
m
The A
r
c
h
i
t
ect
ure of E
-
vot
i
n
g
sy
st
em
i
s
depi
ct
ed i
n
the Figure
1. T
h
e enti
re
operation of the election
i
s
co
nt
rol
l
e
d
b
y
Adm
i
ni
st
rat
o
r /
G
o
v
t
A
g
e
n
c
y
. It
per
f
o
r
m
s
vari
ous
o
p
e
r
at
i
ons
s
u
ch
as sc
hed
u
l
i
n
g t
h
e el
ect
i
on
as per the re
quirem
ent such as local
el
ect
i
on, assem
b
l
y
el
ect
i
on or
parl
i
a
m
e
nt
el
ect
i
on. R
e
gi
st
rat
i
on
of
v
o
t
e
rs
and candidates
and
result a
n
nouncem
ent are
crucial for free
and
fair election.
Figure
1. System
Architecture
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJEC
E
V
o
l
.
6,
No
. 3,
J
u
ne 2
0
1
6
:
11
9
7
– 12
04
1
200
Th
e arch
itecture illu
strates th
e m
o
d
e
rn
electo
r
al system. Th
e electoral p
r
o
c
ess is sa
m
e
as th
e
t
r
adi
t
i
onal
bal
l
o
t
pa
pe
r
base
d
el
ect
i
on. M
a
jo
r
di
f
f
ere
n
ce
he
r
e
i
s
t
h
e
use
o
f
m
odern t
e
c
h
n
o
l
ogy
t
o
m
i
nim
i
ze t
h
e
hum
an i
n
t
e
rfac
e
and e
n
h
a
nce
securi
t
y
t
o
m
a
ke i
t
fo
ol
pr
oo
f syste
m
in
ach
iev
i
ng
th
e in
tend
ed
ob
j
ectiv
e
of free
and
fair election. As
depict
ed in the
Arc
h
itecture th
e e
n
tire proces
s of the election is gove
rne
d
by the
Adm
i
ni
st
rat
o
r
or a
G
ovt
Age
n
cy
. The
rul
e
s
and
g
u
i
d
el
i
n
es
t
o
car
ry
el
ect
ion i
s
fram
e
d a
nd m
oni
t
o
red
by
t
h
e
adm
i
nistrator.
In case
of a
n
y vi
ola
tion t
h
e
adm
i
nistrator a
s
the
right t
o
t
e
rm
inate or
re
sche
dule t
h
e el
ection
pr
ocess
.
Adm
i
ni
st
rat
o
r
i
s
re
spo
n
si
bl
e t
o
re
gi
st
er
new
v
o
t
e
rs, ca
n
d
i
d
at
es
an
d
part
i
e
s
w
h
i
c
h t
a
ke
part
i
n
t
h
e
electio
n
.
As
and
wh
en
n
e
ed
ed
th
e
ad
m
i
n
i
strato
r will
al
so
sch
e
du
le t
h
e electio
n
.
Wherei
n
th
e electio
n can
b
e
di
ffe
re
nt
ki
nd
,
suc
h
as:
l
o
cal
bo
dy
el
ect
i
o
n,
assem
b
l
y
el
ection
or Pa
rliamentary electi
on. I
t
is th
e r
e
spon
sib
l
e
of
Adm
i
ni
st
rat
o
r t
o
ens
u
re f
r
e
e
and
fai
r
el
ect
i
on i
s
he
ld. T
h
e adm
i
nistrator is also res
p
o
n
s
ible fo
r sc
ruti
ng t
h
e
doc
um
ent
s
fur
n
i
s
he
d by
t
h
e
vot
e
r
s an
d can
di
dat
e
s d
u
ri
ng
t
h
e enr
o
l
l
m
ent pr
ocesses i
n
o
r
de
r t
o
ve
ri
fy
i
f
t
h
ey
are valid
voters or im
posters
or ille
gal
voters. On successful ve
rification
of t
h
e doc
u
m
e
nts and
details of t
h
e
v
o
t
er, h
e
/sh
e
will
b
e
p
r
o
v
i
d
e
d
with
a u
n
i
q
u
e
Id
en
tificatio
n
nu
m
b
er kn
own
as Vo
terID
which
is n
e
ed
ed to
cast
v
o
t
e.It is th
e respon
sib
ility
o
f
th
e Ad
m
i
n
i
strato
r to
en
sure th
at n
o
Vo
t
e
rID is p
r
o
v
i
ded
to
th
e illeg
a
l o
r
una
ut
h
o
r
i
zed v
o
t
e
r.
In case
of
C
a
ndi
dat
e
i
s
f
o
u
n
d
t
o
p
r
o
d
u
c
e
i
nval
i
d
o
r
fa
k
e
doc
um
ent
s
t
h
e Adm
i
ni
st
rat
o
r ha
s
th
e ri
g
h
t
t
o
termin
ate h
i
m
from
co
n
t
estin
g
t
h
e election
.
After
th
e sch
e
du
lin
g
t
h
e Ad
m
i
n
i
strato
r will
rel
ease
a
lin
k
t
h
ro
ugh
wh
ich
the
v
o
t
i
n
g is carried
ou
t. Th
is link
i
s
v
a
lid on
ly fo
r a
p
a
rticu
l
ar electio
n
on
particu
l
ar
sch
e
d
u
l
e, on
ly
th
e au
t
h
orized
o
r
v
a
lid vo
ter is allo
wed
t
o
cast h
i
s
v
o
t
e in
t
h
is lin
k
,
no
im
p
o
s
ter
or illeg
a
l
v
o
t
er
will b
e
ab
le t
o
cast h
i
s
vo
te.In ord
e
r t
o
cast
th
e
vo
te th
e vo
t
e
r
n
eeds
p
r
ov
id
es certain
cred
en
tials lik
e h
i
s u
s
er
nam
e
, passw
or
d a
nd
v
o
t
e
rI
D.
On e
n
t
e
ri
ng
i
n
t
o
v
o
t
e
r
pa
ge t
h
e v
o
t
e
r i
s
pr
ov
i
d
ed
wi
t
h
ce
rt
ai
n i
n
f
o
rm
ati
on
su
c
h
as ki
n
d
of
v
o
t
i
n
g
,
l
i
s
t
of
can
d
i
dat
e
s an
d t
h
ei
r sy
m
bol
s. Fi
g
u
re
2
de
pi
ct
s t
h
e
vot
i
n
g l
i
n
k
enabl
e
d
fo
r t
h
e
pri
m
e
min
i
sterial ele
c
tio
n
wherein i
t
is sho
w
n th
at
th
e
p
a
rtic
ul
ar
sche
dul
e
f
o
r
w
h
i
c
h t
h
e l
i
n
k i
s
act
i
v
e.
The
v
o
t
i
ng i
s
allo
wed on
ly on
th
at
sch
e
du
le.
Fi
gu
re
2.
V
o
t
i
n
g Li
nk
Ena
b
l
e
d
Ano
t
h
e
r cru
c
ial fu
n
c
tion
p
e
rfo
rm
ed
b
y
th
e ad
m
i
n
i
strato
r is th
e resu
lt d
ecl
aratio
n. On
com
p
le
tio
n
of
th
e vo
ting
p
r
ocess and
co
un
t
i
n
g
o
f
th
e
vo
tes, th
ead
m
in
is
trato
r
will d
eclare th
e
resu
lt. Th
e en
tire pro
c
ess of
vot
e c
o
u
n
t
i
n
g i
s
deci
de
d an
d
m
oni
t
o
red
by
adm
i
ni
st
rat
o
r or
Go
vt
age
n
cy
.
The adm
i
ni
st
rat
o
r decl
a
r
es t
h
e
resul
t
t
o
ge
neral
p
u
b
l
i
c
usi
ng
di
f
f
er
ent
M
e
di
as l
i
k
e pri
n
t
m
e
dia;
electronic m
e
dia and c
u
rre
n
tly social Medias are
also use
d
to a
n
nounce t
h
e result. Th
e c
a
ndidates are
also allowe
d to
c
h
eck t
h
r
o
ug
h t
h
ei
r acc
ou
nt
l
ogi
n i
n
whic
h they
will be
provide
d
with the
details of
votes
received
by him
and
his
oppone
nt a
n
d total vote
polled.
1.
3.
3.
Assum
p
ti
on Used
So
m
e
assu
m
p
ti
o
n
s
used in
t
h
is wo
rk
are:
1.
It is used th
at t
h
e list of elig
i
b
le v
o
t
ers, cand
i
d
ates are
pe
rform
e
d fairly
by
the adm
i
nistrator.
2.
The
Govt a
g
e
n
cy has
declare
d
the
sc
hedule
and
guideli
n
es for
co
ndu
ctin
g electio
n
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
FPF:
Fraud P
r
oof
Fr
amew
or
k for Electr
oni
c Voting
Syste
m
(Innoce
nt K
a
bandana)
1
201
3.
Th
e list of elig
i
b
le vo
ter’s isp
r
o
v
i
d
e
d fo
r th
e
p
o
lling
station
.
4.
Ad
m
i
n
i
strato
r h
a
s p
r
ov
id
ed
t
h
e v
o
t
ers
th
ei
r p
o
lling
station
.
5.
Th
e
vo
ters are
p
r
ov
id
ed
with
Vo
ter Id
req
u
i
red
to p
a
rticip
ate in
th
e election
.
2.
OU
R CO
NTR
I
BUTIO
N
Au
t
h
en
tication is an
i
m
p
o
r
tan
t
in
an
y op
eratio
n
.
T
h
e m
a
in o
b
ject
i
v
e of
aut
h
e
n
t
i
cat
i
on
i
s
im
provi
ng
th
e in
tegrity o
f
th
e system
th
ereb
y
resistin
g in
v
a
lid vo
ters o
r
illeg
a
l vo
ters affecting
the syste
m
. In
o
r
d
e
r
t
o
ach
iev
e
th
is
we h
a
v
e
in
t
r
oduced
a un
iqu
e
au
th
en
ticatio
n
mech
an
ism
in
E-vo
ting
system
. Th
is h
e
lp
s u
s
to
en
su
re th
at
o
n
l
y th
e au
th
en
ticated
vo
ter is castin
g
th
e
vot
e
.
In
or
de
r t
o
a
u
t
h
e
n
t
i
cat
e a vot
er we
ge
nera
t
e
a
secret k
e
y
wh
ich
is sen
t
to the vo
ter i
n
three d
i
fferen
t
ways i.e. em
ail, s
m
s an
d
as
QRco
d
e
.Th
e
in
tensio
n
of
th
is is to
ensure th
at vo
ter
will n
o
t
m
i
ss th
e v
o
t
i
n
g
pro
cess du
e to
so
m
e
situ
atio
n
a
l hazard
s li
k
e
, co
ngested
m
obi
l
e
net
w
or
k, i
n
t
e
r
n
et
ser
v
er d
o
w
n
an
d i
n
or
der t
o
m
a
ke sure e
v
en
peo
p
l
e
wi
t
h
out
sm
art
ph
o
n
e t
o
be
par
t
o
f
th
e electoral
. Th
e
p
r
o
cess
of
g
e
n
e
ratin
g the
secret
k
e
y is
illu
strated
in the Algorith
m
1
.
2.
1.
Secret key
Ge
neration
for Authentication
Algo
rith
m
for
Secret
k
e
y Generatio
n fo
r Au
t
h
en
tication
:
-
Step
1: Voter credentials like
usernam
e
(V
n
)
s
e
cr
e
t
cod
e
(S
c
)
a
n
d V
o
ter’
s
De
vice ID (
D
im
) is sen
t
to
Adm
i
nistrator.
Γ
=V
n
+ S
c
Step
2
:
Random
secr
et k
e
y (R
K
) i
s
ge
ne
rat
e
d
by
t
h
e
vi
rt
ual
M
achi
n
e
.
Set (
α
,
β
)
Di
+1=
(Z
*Di
+
1)
m
od S
O=
Ω
R
K
=ASCII (
Ω
).
St
ep 3:
Sec
r
et
Key
i
n
put
(S
KI
N
)
ge
ne
rat
e
d us
i
ng U
p
pl
us
R
K
.
Step 4:
Sec
r
et Key
(S
K
)
i
s
ge
nerat
e
d usi
n
g
e
n
cry
p
t
i
o
n
.
S
KIN
→
H (S
KIN
) =S
K
St
ep5:
Ge
nerat
i
on o
f
12
8 bi
t
C
Ke
y
H (
D
im
, S
KIN
)
)
(
x
P
C
Ke
y
St
ep 6:
E
n
cry
p
t
i
on usi
n
g
C
Ke
y
H
(
S
K
, C
K
ey)
)
(
x
Q
µ
St
ep
7:
µ em
bedde
d i
n
B
a
rc
o
d
e
.
Th
e secret code g
e
n
e
ration
to au
th
en
ticate th
e vo
ter
is carried
o
u
t
in
t
w
o
lev
e
ls.In
itially th
e secret
code
ge
ner
a
t
i
o
n i
s
st
art
e
d
by
con
s
i
d
er
t
h
e
γ
whi
c
h c
ont
ai
n
s
use
r
cre
d
e
n
t
i
a
l
s
suc
h
as
use
r
n
a
m
e
and sec
r
et
co
de.
Alon
g with
d
e
v
i
ce ID
of th
e vo
ter, wh
ich
in
th
is case is th
e
IMEI code rep
r
esen
ted
as D
im
. T
h
e
vi
rt
ual
m
achi
n
e
gene
r
a
t
e
s t
h
e R
a
nd
o
m
nu
m
b
er
req
u
i
r
e
d
i
n
o
r
der
t
o
ge
ne
rat
e
t
h
e
fi
nal
secret
c
ode
. T
h
e
p
r
oc
ess
o
f
rando
m
n
u
m
b
e
r
g
e
n
e
ration
i
s
illu
strated
i
n
th
e algorith
m; th
e gen
e
ration
Ran
d
o
m
n
u
m
b
er is b
a
sed on
th
e
pri
n
ciple of linear c
o
ngrue
n
t
i
al form
ula. Here two leve
ls
are pre
d
e
f
ine
d
each to
lim
i
t
the value in
between
two
lev
e
ls; Hi
g
h
lev
e
l represen
ted
b
y
‘
α
’ and
lo
wers lev
e
l
represen
ted
‘
β
’. Th
e ou
tpu
t
of th
is o
p
e
ratio
n
‘O’ is
a R
a
nd
om
generat
e
d w
h
i
c
h i
s
repre
s
ent
e
d b
y
‘
Ω
’.I
n
o
r
d
e
r
t
o
gene
rat
e
t
h
e
fi
nal
secret
co
de we
need t
o
have a
characte
r
, s
o
as to obtain a c
h
aracter t
h
e ‘
Ω
’ is sub
j
ected
to
b
i
n
a
ry to
ascii co
nv
ersi
on
. Th
e ou
tpu
t
o
f
th
is
ope
rat
i
o
n i
s
ou
r req
u
i
r
e
d
R
a
n
dom
key
whi
c
h i
s
den
o
t
e
d
by
‘R
K
’.Usi
n
g
th
is R
K
and U
p
secret Key input S
Kin
is
gene
rat
e
d
.
U
s
i
ng t
h
i
s
i
n
put
fi
nal
secret
key
i
s
pr
o
duce
d
.
I
n
or
der t
o
have t
h
e fi
nal
secret
key
,
S
Kin
is subj
ected
to
two
lev
e
l
o
f
en
cryp
tion
,
wh
ere in
t
h
e fi
rst lev
e
l
th
e en
cryp
tio
n
is
p
e
rform
e
d
u
s
ing
th
e MD5 wh
ich resu
lts
i
n
a resul
t
of
1
28
bi
t
(1
6 by
t
e
) val
u
e
whi
c
h i
s
exp
r
esse
d a hexa
deci
m
a
l
code
of
32
di
gi
t
whi
c
h i
s
de
n
o
t
ed as
th
e C
ke
y
. Thi
s
enc
r
y
p
t
i
o
n
o
p
erat
i
o
n i
s
re
prese
n
t
e
d
by
a f
unct
i
o
n
de
not
e
d
by
P
(
x
)
. T
h
e sec
o
nd
l
e
vel
o
f
en
cry
p
tio
n is carried
o
u
t
on
t
h
is resu
lt i.e
C
Ke
y
and S
K.
Thi
s
ope
rat
i
o
n i
s
pe
rf
orm
e
d
u
s
i
n
g
AE
S e
n
cr
y
p
t
i
o
n
whi
c
h i
s
den
o
t
e
d
by
Q
(
x
)
a
n
d
pr
o
duce
s
re
sul
t
s whi
c
h i
s
also
a
1
2
8
b
it. This resu
lt
wh
ich is represen
ting
in
µ
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJEC
E
V
o
l
.
6,
No
. 3,
J
u
ne 2
0
1
6
:
11
9
7
– 12
04
1
202
is the fi
nal se
cret code.
In
order to e
n
hance the sec
u
rity
feature we h
a
v
e
em
b
e
d
d
e
d
th
is
cod
e
within
th
e
QRcod
e
.
So
t
h
at it will n
o
t
b
e
d
ecry
p
ted
b
y
o
t
h
e
rs, t
h
is code is d
ecrp
t
ab
le
o
n
l
y using
th
e
v
o
t
er’s
d
e
v
i
ce
sin
ce
i
t
needs
t
h
e
I
M
EI
of t
h
e
v
o
t
e
r’
s
devi
ce.
Taki
ng
i
n
con
s
id
eratio
n tech
n
i
cal lim
i
t
ati
o
n
s
th
at are cau
s
ed
accidentally we have e
n
s
u
re
that the fi
nal se
cret key is se
nt
to the user i
n
three
differe
n
t
ways i.e. SMS, Em
a
il
an
d
Q
RCod
e
.
I
t
sho
u
l
d
b
e
no
ted
th
at all th
r
ee ar
e sen
t
to v
o
t
er
t
h
ro
ugh h
i
s p
e
rson
al email,
m
o
b
ile n
u
m
b
e
r
and s
o
on so that it is not acce
ssed
by
othe
rs.
2.
2.
Result Securi
ng
using Di
gital Signature
On
ce th
e Elect
io
n
is co
m
p
let
e
d
th
e
po
lled
vo
tes m
u
st b
e
secu
red
fro
m
miscrean
ts so
that th
e resu
lt
sho
u
l
d
not
be
m
a
ni
pul
at
ed
o
r
cheat
ed
.
In
o
r
der
t
o
ac
hi
eve
t
h
i
s
w
e
h
a
ve
use
d
e
n
cry
p
t
i
o
n, s
o
t
h
at
t
h
e
pol
l
e
d
votes
are
sec
u
red.This
achie
ved
using t
h
re
e pa
ram
e
ters such as
VoterID
(V
ID
)
,
Party
I
D
(P
ID)
, Electio
n ID
(E
ID
) where,
V
ID
= is th
e vo
t
e
casted
b
y
th
e vo
ter.
P
ID=
is th
e party ID to wh
ich the vo
te as
b
e
en
casted
.
E
ID=
is th
e electio
n
ID represen
tin
g th
e ty
p
e
o
f
electio
n
.
In
orde
r to s
a
fegua
rd the cast
e
d
votes t
h
ese
three
p
a
r
a
m
e
te
r
s
ar
e subj
ected
to
en
cr
yp
tion
op
er
ation.
The
process
of securing the
votes
th
rou
g
h
en
cry
p
tio
n is i
llu
strated
i
n
al
g
o
rith
m
2
.
Aft
e
r th
e en
cryp
ti
o
n
th
e
resulting
digita
l signat
u
re
is store
d
in the
da
tabase.So t
h
at
even if an
y
one
accide
ntally access the
data
base
will n
o
t
b
e
ab
l
e
to
id
en
tify th
e resu
lt sin
ce th
ey wo
u
l
d
no
t g
e
t th
e d
e
tails o
f
p
e
rson
vo
ted
or who
m
h
e
h
a
s
vot
e
d
or
w
h
i
c
h
pa
rt
y
as sec
u
r
e
d
ho
w m
u
ch
v
o
t
e
.
Algo
rith
m
2
.
Vo
te po
llin
g
an
d
resu
lt
coun
tin
g
Step
1
:
Vo
ter (V
)
→
P
ID
.
Vo
ter will select th
e p
a
rty
h
e
wan
t
s to
vo
te. After th
e
castin
g
o
f
v
o
t
e, en
cryp
tion
is p
e
rfo
rm
ed
on
three
attrib
u
t
es V
ID
, E
ID
andP
ID
Step
2: H (V
ID
) +H
(
E
ID
) +H (P
ID
) = S
DB.
Encry
p
t
i
on
use
d
i
s
M
D
5, a
f
t
e
r t
h
e e
n
cry
p
t
i
o
n
usi
n
g t
h
e
di
gital sig
n
a
tu
res
we store all the attrib
u
t
es as
resu
lt
in
th
e
Database. No
raw resu
l
t
is sto
r
ed
.
Step 3:P
VD
→
S
DB
Polled
votes are selected
from the st
ore
d
data
base.
Step 4:R
E
→
(D
E
ID
&&
DP
ID
).
Th
e abo
v
e
algo
rith
m
illu
strates th
e
p
r
o
cess of
vo
te po
ll
in
g
,
in
itially dep
e
nd
ing on
t
h
e typ
e
of
electio
n
th
e can
d
i
d
a
tes are listed
on
th
e vo
tin
g
site. Th
e voter selects the candi
dates whom
he wants toelect.
Th
e cand
i
date selectio
n
is d
o
n
e
on
th
e
b
a
sis o
f
party ID.On
ce th
e vo
ting
is d
o
n
e
th
e prog
ram
au
to
m
a
t
i
cally
perform
s
the encry
p
tion
of P
ID;
EID
and V
ID
.
The enc
r
ypti
on is
pe
rform
e
d to ac
hieve
s
ecrecy. T
h
e type of
en
cry
p
tio
n
u
s
ed
is th
e MD5
.
Here it sh
ou
ld
b
e
no
ted
th
at on
ly th
e Hash
ed v
a
lu
e o
f
th
e
po
lled
vo
tes is sto
r
ed
in
th
e
d
a
tab
a
se, no
raw
d
a
ta is sto
r
ed
.
So
t
h
at ev
en
i
n
the
case of the
database is
hacke
d
, the
hac
k
e
r
s
or t
h
e
rogu
e en
tity d
o
e
s no
t g
e
t th
e in
form
atio
n
ab
ou
t wh
o
was
v
o
t
ed
fo
r whom
.
Th
ere b
y
help
in
g
to
m
itig
ate th
e
m
a
l
i
c
i
ous act
of m
a
ni
pul
at
i
n
g v
o
t
e
s.
Du
ri
n
g
t
h
e co
u
n
t
i
ng
of t
h
e
v
o
t
e
s t
h
e pol
l
e
d
vot
es
i
n
t
h
e f
o
rm
of has
h
e
d
val
u
es
or
di
gi
t
a
l
si
gnat
u
re of
t
h
e Part
y
ID
and El
ect
i
o
n I
D
i
n
o
r
de
r t
o
ann
o
unce t
h
e wi
n
n
er
. The
v
o
t
e
r I
D
gi
ves
i
n
f
o
rm
ation
ab
o
u
t
w
h
o
m
as vot
ed
w
h
om
i
s
negl
ect
ed i
n
co
u
n
t
i
n
g
pr
ocess
.
I
n
t
h
e
fol
l
owi
n
g
sect
i
on
we
di
scuss
a
b
o
u
t
t
h
e
per
f
o
r
m
a
nce an
d
resul
t
a
n
al
y
s
i
s
of
o
u
r
p
r
op
ose
d
sy
st
em
.
3.
RESULT ANALYSIS AND
PE
RFORMANCE PARAMETERS
The ex
peri
m
e
nt
s are carri
e
d
on Test
be
d Desi
g
n
e
d
o
n
t
h
e Java e
nvi
r
o
nm
ent
.
The ex
peri
m
e
nt
i
s
per
f
o
r
m
e
d usi
ng I
n
t
e
l
pr
oce
ssor
ope
rat
i
n
g
at
1.6G
Hz,
R
A
M
of 2
G
B
,
and st
o
r
a
g
e of 5
0
0
GB
. Th
e key
obs
er
vat
i
on
o
b
ser
v
e
d
f
r
om
t
h
e ex
peri
m
e
nt
al
resul
t
i
s
t
h
at
, t
h
e aut
h
ent
i
cat
i
on m
e
t
hod o
ffe
rs,
Ef
fi
ci
ency
,
R
o
b
u
st
ne
ss a
n
d S
p
ee
d.
3.
1.
E
x
ecuti
on
spe
e
d a
nd L
i
ght
w
ei
ght
In com
p
ared t
o
the
algorithm
s
used in c
o
nve
n
tional
electroni
c voting system
, FPF algorithm
s
con
s
um
e l
e
ss
t
i
m
e
and reso
urces s
u
c
h
as
m
e
m
o
ry
i
n
or
der t
o
per
f
o
rm
vari
ous t
a
sks l
i
k
e enc
r
y
p
t
i
o
n
,
decry
p
t
i
o
n
an
d
ge
nerat
i
o
n
of
t
h
e sec
r
et
key
r
e
qui
red
f
o
r
t
h
e
aut
h
e
n
t
i
cat
i
on
pr
ocess
.
3.
2.
Defe
ndable Algori
t
hm
Th
e al
g
o
rith
m u
s
es m
u
ltip
le
en
cryp
tion
and
d
ecry
p
tio
n an
d ex
tern
al att
r
ibu
t
es su
ch as IMEI to
gene
rat
e
t
h
e s
ecret
key
.
W
hi
ch m
a
kes i
t
diffi
cul
t
f
o
r t
h
e
attacker to
gue
ss, retrie
ve and ge
nerate duplicate
secret key.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
FPF:
Fraud P
r
oof
Fr
amew
or
k for Electr
oni
c Voting
Syste
m
(Innoce
nt K
a
bandana)
1
203
3.
3.
Secret Key
Hi
ding
The ge
ne
rat
e
d
secret
key
i
s
sent
t
o
t
h
e co
n
cerne
d v
o
t
e
r t
h
r
o
ug
h t
h
re
e d
i
ffere
nt
m
eans ensu
ri
n
g
he
d
o
e
s no
t lo
se th
e
v
o
ting
o
ppor
tun
ity. Th
ese t
h
r
ee m
ean
s ar
e sm
s, e
m
a
il, an
d
Q
R
C
o
d
e
.
I
t
sh
ou
ld b
e
no
ted th
at
all th
ese are sen
d
to vo
ters p
e
rson
ally th
roug
h h
i
s p
e
rs
ona
l em
a
il, and
phone
num
b
er.
The se
cret
key
to t
h
e
vot
e
r
i
s
enc
r
y
p
t
ed an
d i
s
not
vi
si
bl
e i
n
or
de
r
t
o
vi
s
u
al
i
ze t
h
e cod
e
i
t
need
s
t
o
be
dec
r
y
p
t
e
d w
h
i
c
h
re
qui
r
e
s t
h
e
vot
e
r’s
de
vi
ce.
3.
4.
Resul
t
E
n
cr
yp
ti
on
an
d
Hi
di
ng
An
ot
he
r key
f
act
or i
s
t
h
e encry
p
t
i
on
of t
h
e p
o
l
l
e
d res
u
l
t
s
i
n
orde
r t
o
avoi
d m
a
ni
p
u
l
a
t
i
on. T
h
e
en
cry
p
ted
result is
sto
r
ed
rat
h
er th
an
sto
r
i
n
g
th
e o
r
i
g
i
n
al
dat
a
. B
y
doi
n
g
so we
ac
hieve higher
degree of
secrecy such t
h
at eve
n
when accide
ntally achieves the ac
cess to
databa
se it will be i
m
possible for
him
to
reliev
e
th
e d
e
tails sin
ce it is st
o
r
ed
u
s
ing
d
i
g
i
tal sig
n
a
tures
of th
e orig
in
al
resu
lt.
3.
5.
Multiple vo
ter
Accessibility
FPF supports m
u
ltiple users’ login and aut
h
enti
cation sim
u
ltaneous the
r
e
by allowing la
rge
num
ber
of
v
o
t
e
rs t
o
v
o
t
e
wi
t
h
out
a
n
y
pr
og
ram
gen
e
rat
e
d e
r
r
o
r. T
h
ere
f
ore FPF
can be
co
nsidered as
scalabl
e
and
r
obu
st.
3.
6.
Resul
t
a
n
al
ysi
s
an
d Per
f
orm
a
nce
Par
a
me
t
er
The ex
pe
ri
m
e
nt
i
s
con
duct
e
d usi
ng Test
bed
dev
e
l
o
ped
on t
h
e
basi
s of Ja
va. T
h
e e
xpe
ri
m
e
nt
i
s
per
f
o
r
m
e
d on
a sy
st
em
usi
n
g
Int
e
l
core i
3
p
r
oces
so
r r
u
n
n
i
ng at
spee
d o
f
3.
20
G
H
z an
d havi
ng a m
e
m
o
ry
o
f
4
G
B, and
64
bit win
d
o
ws
7
op
erating
system
.
By a
ti
me f
u
n
c
tion
th
e to
t
a
l o
f
ti
m
e
tak
e
n
fo
r au
t
h
en
ticatio
n
is
su
mm
a
tio
n
of t
h
e all abov
e
p
e
rfo
r
m
a
n
ce p
a
rameter wh
ich
is
illu
strated
as
fo
llo
ws in th
e
graph
.
T
tot
=KT
Whe
r
e T
tot
is t
h
e overall tim
e for the c
o
m
p
lete cycle.
Whe
r
e
K is t
h
e
Perform
a
nce Ratio
K=
η
N
Whe
r
e t
h
e
η
=A
/B
W
h
er
e
N
is t
h
e nu
m
b
er
of
simu
ltan
e
ou
s u
s
er
.
η
is th
e ratio
o
f
u
s
er cred
ential,
W
h
ere A is Usernam
e
and B is Pass
word
or sec
r
et code.
Whe
r
e
in the
usernam
e
is a maxim
u
m
of
90 c
h
aracte
r
s
wh
ereas p
a
ssword
leng
th is infi
n
ity.
The
processi
ng tim
e
capab
ility of the
FPF is
analyzed
using th
e tim
e require
d in
proces
sing
vari
ous
ope
rat
i
o
n i
n
o
r
der t
o
per
f
o
r
m
t
h
e a
u
t
h
e
n
t
i
cat
i
on t
a
s
k
.
In
Fi
gu
re
3 i
t
i
s
g
r
a
phi
cal
depi
ct
e
d
t
h
e
beha
vi
o
r
o
f
t
h
e
FPF
for t
h
e m
u
ltiple voters
with fi
xed leng
th
of use
r
c
r
ede
n
t
i
al param
e
ters.
Fi
gu
re
3.
Pr
oce
ssi
ng
Ti
m
e
An
al
y
s
i
s
usi
n
g Fi
xed
Le
ngt
h
Us
er C
r
e
d
e
n
t
i
a
l
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
IJEC
E
V
o
l
.
6,
No
. 3,
J
u
ne 2
0
1
6
:
11
9
7
– 12
04
1
204
Fig
u
re
4
.
Pro
c
essin
g
Tim
e
’s An
alysis fo
r
Variab
le Leng
th User Cred
en
tial
Fi
gu
re
4
depi
ct
s t
h
e
gra
p
h
o
f
p
r
oces
si
n
g
t
i
m
e
obt
ai
ne
d
fo
r t
h
e pr
o
p
o
s
ed
sy
st
em
usi
ng
vari
abl
e
l
e
n
g
t
h
u
s
er creden
tial for m
u
ltip
le v
o
t
er log
i
n
sim
u
ltan
e
o
u
sly.
It is seen
fro
m
th
e g
r
ap
h
t
h
e frame wo
rk
su
ccessfu
lly
achieves the intended l
o
we
r processi
ng s
p
eed irres
p
ective of the
vari
ous pa
ram
e
ters such as
num
ber
of
sim
u
l
t
a
neousl
y
, t
h
e l
e
n
g
t
h
of
user c
r
e
d
ent
i
a
l
and
so
o
n
. T
h
e pr
ocessi
ng t
i
m
e
for t
h
e f
r
a
m
ewor
k i
s
c
o
n
s
i
d
ere
d
in m
i
lliseconds
.
4.
CO
NCL
USI
O
N
In t
h
i
s
pa
pe
r an effi
ci
e
n
t
Fool
p
r
oo
f Fra
m
ewor
k f
o
r el
ect
ro
ni
c vot
i
n
g i
s
devel
ope
d w
h
erei
n t
h
e
secu
r
ity in
v
o
t
in
g
system
is
en
h
a
n
c
ed
b
y
usin
g
t
h
e pr
oposed
system
. Pr
o
p
o
s
ed
system as d
e
sign
ed
a n
e
w
aut
h
e
n
t
i
cat
i
on
m
echani
s
m
maki
n
g
use
of t
h
e use
r
de
vi
c
e
as well as
user c
r
ede
n
tial and also a s
ecure
d
encry
p
t
i
on
of t
h
e fi
nal
res
u
l
t
i
s
perf
orm
e
d i
n
or
de
r t
o
av
o
i
d t
h
e
m
a
ni
pul
at
i
on o
f
res
u
l
t
.
In c
o
m
p
ared t
o
t
h
e
exi
s
t
i
ng sy
st
em
t
h
e prop
ose
d
sy
st
em
as
ac
hieve
d
reduce
d processi
ng tim
e to authenticate the voter and t
h
e
u
s
e
o
f
d
i
g
ital sig
n
a
t
u
re to
sav
e
resu
lt mitig
ate
s
th
e
p
r
ob
lem
o
f
m
a
n
i
p
u
l
atin
g
th
e po
lled resu
lts.
REFERE
NC
ES
[1]
M. Volkamer, “Evalu
ation of Electron
i
c Voting
:
Require
ments and Evaluation P
r
ocedures to Su
pport Responsible
Ele
c
tion
Authori
ties,
”
Spring
e
r S
c
ien
c
e
&
Bu
siness Media, Law
, p
p
. 248
, 2009
.
[2]
P. R
y
an
and B
.
Schoenmak
ers, “E-Voting
an
d Identity
: Second Intern
ation
a
l Conf
eren
ce,”
VOTE-ID 200
9,
Luxembourg, Pr
oceed
ings
Sprin
ger, Computers
,
pp. 191
, 2009
.
[3]
S. Caar
ls, “E-v
oting Handbook
: Key
Steps
in
th
e Implementation of E-
enab
led Electio
ns,”
C
ouncil o
f
Europ
e
,
Polit
ical
Sc
ien
c
e
, pp
. 60
, 2010
.
[4]
M. Travn
i
cek, “Electronic Votin
g
to h
a
ve or no
t to have
?
”
European Scientific Jou
r
nal
, vol. 3
,
201
4.
[5]
Chaeik
a
r, “Electronic voting s
y
s
t
em
s for European Union Countries,”
Journal o
f
Next Generation Information
Technology
, vo
l/issue: 4(5), 2013
.
[6]
Achieng
and Ru
hode, “Th
e
Ado
p
tion
and
Challenges of Electron
ic vo
ting
Tech
n
o
logies within
the south African
Context
,
”
Intern
ational
Journal
of Managing
Information Techn
o
logy
, vol/issue:
5(4), 2013
.
[7]
J. Y. Lai and C
.
F. Lin, “Design a
nd Implementation of
an Electronic Voting
S
y
ste
m
with Contac
tle
ss IC Ca
rds,
”
Graduate
Institu
t
e
of In
form
ation
and Com
puter
Educa
tion,
Nat
i
onal Kaohsiung
Norm
al Universi
t
y
, R
e
triv
ed,
12
th
Nov, 2015.
Evaluation Warning : The document was created with Spire.PDF for Python.