ENHANCED INFORMATION SECURITY FOR VOTING SYSTEM IN EMERGENCIES USING PAILLIER’S CRYPTOSYSTEM
DOI:
https://doi.org/10.37943/22FULA2667Keywords:
Paillier’s Algorithm, Homomorphic, Python, E-voting, Encryption, Voter Privacy, Data SecurityAbstract
This study explores the application of Paillier’s Partial Homomorphic Encryption (PHE) in the context of secure digital voting systems, particularly in emergency situations such as pandemics, natural disasters, or martial law. The proposed system is implemented using Python with the Django framework and the pycryptodome library to ensure a secure and scalable environment. A key feature of Paillier’s cryptosystem is its ability to perform computations directly on encrypted data, which preserves voter confidentiality and guarantees data integrity without requiring decryption. A simulated voting scenario involving 10 voters and 3 candidates was conducted to evaluate the system. Encrypted votes were processed using homomorphic operations, allowing for the secure aggregation of votes. The results demonstrated that the system accurately computed vote totals—35 votes for Candidate A, 50 for Candidate B, and 100 for Candidate C—without compromising security. The system proved efficient and reliable for small-scale implementations. However, the study identifies significant challenges when scaling the system to national-level elections. The cryptographic operations required by Paillier’s scheme are computationally intensive and could hinder performance when processing millions of encrypted votes in real-time. Therefore, while the system shows high potential for secure e-voting, further research is required to optimize performance. The authors propose future work in two directions: optimizing the underlying cryptographic operations and integrating blockchain technologies to enhance transparency and auditability. Overall, the results suggest that Paillier’s PHE provides a robust framework for emergency e-voting systems and offers a substantial improvement over traditional voting methods in terms of both security and privacy.
References
Roopa, K., Gokul, B. S., & Arakalgud, S. K. (2021). Use case of Paillier Homomorphic Algorithm for Electronic-Voting Systems. In 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT) (pp. 273–278). IEEE. https://doi.org/10.1109/ICEECCOT52851.2021.9708030
Faruk, M. J. H., Islam, M. S., Hossain, M. I., Rahman, M. M., Hossain, M. E., & Rahman, M. A. (2022). Development of blockchain-based e-voting system: Requirements, design and security perspective. In 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 959–967). IEEE. https://doi.org/10.1109/TrustCom56396.2022.00132
Chuprin, V. M., Vyshnyakov, V. M., & Komarnytsky, O. O. (2019). Method of counteracting attacks of a mediator in a transparent system of Internet voting. Information Protection: Ukrainian Information Security Research Journal, 20(2), 172–182. Kyiv: NAU. https://doi.org/10.18372/2410-7840.20.13079
Shivers, R., Rahman, M. A., Faruk, M. J. H., Shahriar, H., Cuzzocrea, A., & Clincy, V. (2021). Ride-hailing for autonomous vehicles: Hyperledger Fabric-based secure and decentralized blockchain platform. In 2021 IEEE International Conference on Big Data (Big Data) (pp. 5450–5459). IEEE. https://doi.org/10.1109/BigData52589.2021.9671379
Patil, S., Bansal, A., Raina, U., Pujari, V., & Kumar, R. (2018). E-smart voting system with secure data identification using cryptography. In 2018 3rd International Conference for Convergence in Technology (I2CT) (pp. 1–4). IEEE. https://doi.org/10.1109/I2CT.2018.8529497
Sedky, M. H., & Hamed, E. M. R. (2015). A secure e-government's e-voting system. In 2015 Science and Information Conference (SAI) (pp. 1365–1373). IEEE. https://doi.org/10.1109/SAI.2015.7237320
Taş, R., & Tanrıöver, Ö. Ö. (2020). A systematic review of challenges and opportunities of blockchain for e-voting. Symmetry, 12(8), 1328. https://doi.org/10.3390/sym12081328
Taş, R., & Tanrıöver, Ö. Ö. (2021). A manipulation prevention model for blockchain-based e-voting systems. Security and Communication Networks, 2021, Article ID 6673691, 16 pages. https://doi.org/10.1155/2021/6673691
Faruk, M. H., Hossain, S., & Valero, M. (2021). EHR data management: Hyperledger Fabric-based health data storing and sharing. In The Fall 2021 Symposium of Student Scholars. https://doi.org/10.13140/RG.2.2.20299.05928
Chandel, A., Aggarwal, A., Mittal, A., & Choudhury, T. (2019). Comparative analysis of AES & RSA cryptographic techniques. In 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 410–414). IEEE. https://doi.org/10.1109/ICCIKE47802.2019.9004338
Qadir, A. M., & Varol, N. (2019). A review paper on cryptography. In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE. https://doi.org/10.1109/ISDFS.2019.8757514
Faruk, M. J. H., Islam, M., Alam, F., Shahriar, H., & Rahman, A. (2022, September). Bie Vote: A biometric identification enabled blockchain-based secure and transparent voting framework. In 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA) (pp. 253–258). IEEE. https://doi.org/10.1109/BCCA55292.2022.9922588
Galymzhankyzy, Z., Rinatov, I., Abdiraman, A., & Unaybaev, S. (2024). Assessing electoral integrity: Paillier’s partial homomorphic encryption in e-voting system. In 2024 IEEE 4th International Conference on Smart Information Systems and Technologies (SIST) (pp. 194–201). IEEE. https://doi.org/10.1109/SIST61555.2024.10629522
Galymzhankyzy, Z., Rinatov, I., Abdiraman, A., & Unaybaev, S. (2024). Optimizing e-voting systems: Integration of Paillier cryptosystem and parallel processing for enhanced security and efficiency. In 2024 IEEE AITU: Digital Generation (pp. 154–160). IEEE. https://doi.org/10.1109/IEEECONF61558.2024.10585388
Willemson, J., & Krips, K. (2023, September). Estimating carbon footprint of paper and internet voting. In International Joint Conference on Electronic Voting (pp. 140–155). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-43756-4_9
Basal, A., Raina, U., Pujari, V., & Kumar, R. (2018, April). E-smart voting system with secure data identification using cryptography: 2018. In 3rd International Conference for Convergence in Technology (I2CT) (pp. 1–4). https://doi.org/10.1109/I2CT.2018.8529497
Naser, S. M. (2021). Cryptography: From the ancient history to now, its applications and a new complete numerical model. International Journal of Mathematics and Statistics Studies, 9(3), 11–30. https://doi.org/10.13140/RG.2.2.13438.51524
Nurgaliyev, A., & Wang, H. (2021, October). Comparative study of symmetric cryptographic algorithms. In 2021 International Conference on Networking and Network Applications (NaNA) (pp. 107–112). IEEE. https://doi.org/10.1109/NaNA53684.2021.00026
Shalabi, E., Khedr, W., Rushdy, E., & Salah, A. (2025). A comparative study of privacy-preserving techniques in federated learning: A performance and security analysis. Information, 16(3), 244. https://doi.org/10.3390/info16030244
Mehmood, A., Shafique, A., Alawida, M., & Khan, A. N. (2024). Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum techniques. IEEE Access, 12, 27530–27555. https://doi.org/10.1109/ACCESS.2024.3367232
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Articles are open access under the Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish a manuscript in this journal agree to the following terms:
- The authors reserve the right to authorship of their work and transfer to the journal the right of first publication under the terms of the Creative Commons Attribution License, which allows others to freely distribute the published work with a mandatory link to the the original work and the first publication of the work in this journal.
- Authors have the right to conclude independent additional agreements that relate to the non-exclusive distribution of the work in the form in which it was published by this journal (for example, to post the work in the electronic repository of the institution or publish as part of a monograph), providing the link to the first publication of the work in this journal.
- Other terms stated in the Copyright Agreement.