The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique properties that can perform mathematical operations against ciphertext. This paper proposed the use of the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the additional properties so that it can calculate the results of voting data that has been encrypted without having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote tallying process by comparing the advantages and disadvantages of each algorithm.

Published by Universitas Ahmad Dahlan
Journal Name Perfecting a Video Game with Game Metrics
Contact Phone-
Contact Name Nizirwan Anwar
Contact Email nizirwan.anwar@esaunggul.ac.id
Location Kota yogyakarta, Daerah istimewa yogyakarta INDONESIA
Website TELKOMNIKA| http://journal.uad.ac.id/index.php/TELKOMNIKA|
ISSN ISSN : 16936930, EISSN : 23029293, DOI : http://dx.doi.org/10.12928/telkomnika.v16i3.7209,
Core Subject Science,
Meta Subject Computer Science & IT,
Meta DescSubmitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
PenulisSuwandi, Rifki , Nasution, Surya Michrandi , Azmi, Fairuz
Publisher ArticleUniversitas Ahmad Dahlan
Subtitle Article TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Scholar Googlehttp://scholar.google.com/scholar?q=%2Bintitle%3A&…
View Articlehttp://journal.uad.ac.id/index…
DOIhttps://doi.org/10.12928/telkomnika…
DOI Number DOI: 10.12928/telkomnika.v16i2.8420
Download Article [1] http://journal.uad.ac.id/index.php/TELKO…
Download Article [2]

 

Kartu Secure Digital Secure Neighbor Discovery Protocol 360 Secure Browser Secure Shell Keamanan Lapisan Transportasi HTTPS