Question: complete the METHODOLOGY, EVALUATION and SUGGESTED methods in my paper for me please: Verifiable E - voting: Comparing Homomorphic Encryption and Zero - Knowledge Proof
complete the METHODOLOGY, EVALUATION and SUGGESTED methods in my paper for me please:
Verifiable Evoting: Comparing Homomorphic Encryption and ZeroKnowledge ProofBased Schemes
Keywords: Security, Cryptography, Voting, Confidentiality
Abstract
Security in online voting systems is essential for safeguarding the democratic process, protecting voter rights and privacy, maintaining public trust, and upholding the integrity of election outcomes. This research focuses on two innovative methodologies, homomorphic encryption and zeroknowledge proofs, aimed at fortifying the trustworthiness of electronic voting systems. As online voting platforms continue to be used and slowly becoming the best option for voting as they have quite a number of advantages, ensuring the confidentiality and accuracy of ballots emerges as a concern. Through assessing the pros and cons of each approach in terms of security, verifiability, and scalability, this study helps us understand how these methods could be useful for online voting by looking at what experts have already said. Our discoveries will provide helpful advice to leaders, election workers, and tech experts as they work on making electronic voting fair and transparent.
INTRODUCTION
The development of advanced innovations has revolutionised various parts of human existence, including the manner in which we direct elections. is just characterized as a technique with perceived decides that includes the demonstration of choosing, through casting a ballot, at least one people to hold a specific office or to represent a specific group Jinhui Evoting systems that can be verified are a digital evolution of the electoral process. They combine the convenience of electronic voting with stringent security measures and transparent protocols to keep democratic elections honest. These systems authenticate voters through various secure methods, ensuring each individual can only cast one anonymous vote.
Evoting systems facilitate access to remote areas, enabling individuals to vote from any location via the internet, offering flexibility in casting their ballots. However, a notable drawback is their susceptibility to hacking, where without proper encryption measures, hackers can potentially intercept and manipulate vote information Tannishk The prerequisites for an effective Evoting system include: stringent authentication to ensure only authorised voters participate, ensuring each voter's vote is unique to prevent multiple submissions, guaranteeing accurate results without manual interference, and providing verifiability both during and after the voting process.
Encryption serves as a means to secure messages or data by encoding them with a key, limiting access to authorised parties. While traditional encryption methods safeguard data during transmission, decryption is necessary for any operations performed on the data, posing potential vulnerabilities if the computing environment is compromised, which can lead to loss of data. Verifying electronic voting methods poses a significant challenge, as the actual implementation often diverges from public expectations. Therefore, it's crucial for voters to easily verify that their ballots are accurately recorded and counted after election results are announced.
To address this issue, a comparison between homomorphic encryption and Knowledge ProofBased Schemes has been conducted to offer a recommendation regarding the preferred method. This review delves into the technical intricacies and practical implications of both approaches, evaluating their efficacy in safeguarding evoting systems against tampering and manipulation.
METHODOLOGY
In this section of paper, we aim to give an outline of the methodology adopted for conducting this literature review on zeroknowledge proofbased schemes in the scope of electronic voting.
Inclusion and Exclusion criteria for sources:
To come up with justified and unbiased work, we included scholarly articles, reputable conference papers, and reputable online resources published between the years and as these are more recent and are of reference to the current world. All the abovementioned sources were considered if they specifically discussed zeroknowledge proofbased schemes in the context of electronic voting systems. Most importantly, nonEnglish publications were not considered for this work.
Database Considered for sources:
The literature search was primarily conducted in reputable academic databases such as IEEE Xplore, ACM Digital Library, and Google Scholar. Additionally, keywordguided searches were conducted on chrome browser to obtain relevant articles on cryptography and security.
Table form representation
Criteria
Description
Keywords
ZeroKnowledge Proofs, Electronic Voting, Cryptography
Year Range
older core ideas were considered
Publication Types
Scholarly articles, confe
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
