{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T08:47:55Z","timestamp":1750150075660},"reference-count":27,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cryptography and steganography could be a fitting \u2018tool kit\u2019 for enhancing the security of sensitive election-related information transmitted over public networks, thereby also ensuring free, fair and credible election\/voting. Most of the existing secure e-voting systems are based on public key cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorization Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. One of such is the quantum algorithm discovered by Peter Shor in 1994, which can solve both IFP and DLP problems in polynomial time. Consequently, the existence of quantum computers in the range of 1000 bits would spell doom to systems based on those problems. This paper presents the development of a new crystographic system that combines Post Quantum Cryptography with steganography to ensure that the security of e-voting is maintained both in classical computing era as well as post-quantum computing era. Our experiments\u2019 results shows that our proposed system performed better than existing ones.<\/jats:p>","DOI":"10.1515\/comp-2019-0018","type":"journal-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T09:02:33Z","timestamp":1571302953000},"page":"292-298","source":"Crossref","is-referenced-by-count":8,"title":["Post-Quantum Crystography System for Secure Electronic Voting"],"prefix":"10.1515","volume":"9","author":[{"given":"Arome","family":"Junior Gabriel","sequence":"first","affiliation":[{"name":"Department of Cyber Security Science , Federal University of Technology , Akure , Nigeria"}]},{"given":"Boniface Kayode","family":"Alese","sequence":"additional","affiliation":[{"name":"Department of Cyber Security Science , Federal University of Technology , Akure , Nigeria"}]},{"given":"Adebayo Olusola","family":"Adetunmbi","sequence":"additional","affiliation":[{"name":"Department of Computer Science , Federal University of Tenology , Akure , Nigeria"}]},{"given":"Olumide Sunday","family":"Adewale","sequence":"additional","affiliation":[{"name":"Department of Computer Science , Federal University of Technology , Akure , Nigeria"}]},{"given":"Oluwafemi Abimbola","family":"Sarumi","sequence":"additional","affiliation":[{"name":"Department of Computer Science , Federal University of Technology , Akure , Nigeria"}]}],"member":"374","published-online":{"date-parts":[[2019,10,16]]},"reference":[{"key":"2022042707443484448_j_comp-2019-0018_ref_001_w2aab3b7c17b1b6b1ab1ab1Aa","unstructured":"[1] Hadullo K., Oboko R., Omwenga E., A model for evaluating e-learning systems quality in higher education in developing countries, International Journal of Education and Development using Information and Communication Technology (IJEDICT), 2017, 13(2), 185-204"},{"key":"2022042707443484448_j_comp-2019-0018_ref_002_w2aab3b7c17b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] Traxler J., Distance Learning\u2014Predictions and Possibilities Journal of Education Science, 2018, 8, 35; DOI: https:\/\/doi:10.3390\/educsci8010035, www.mdpi.com\/journal\/education10.3390\/educsci8010035,www.mdpi.com\/journal\/","DOI":"10.3390\/educsci8010035"},{"key":"2022042707443484448_j_comp-2019-0018_ref_003_w2aab3b7c17b1b6b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"[3] Getachew H. M., Monica J. G., A contextualized IT adoption and use model for telemedicine in Ethiopia, Journal of Information Technology for Development, 2019, 25(2), 184-203, DOI: https:\/\/doi.org\/10.1080\/02681102.2018.146105710.1080\/02681102.2018.1461057","DOI":"10.1080\/02681102.2018.1461057"},{"key":"2022042707443484448_j_comp-2019-0018_ref_004_w2aab3b7c17b1b6b1ab1ab4Aa","doi-asserted-by":"crossref","unstructured":"[4] Al-rawahna A. S. M., Chen S., Hung C., The Barriers Of E-Government Success: An Empirical Study From Jordan, International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), 2018, 9(2), DOI: https:\/\/doi\/\/10.5121\/ijmpict.2018.920110.5121\/ijmpict.2018.9201","DOI":"10.5121\/ijmpict.2018.9201"},{"key":"2022042707443484448_j_comp-2019-0018_ref_005_w2aab3b7c17b1b6b1ab1ab5Aa","unstructured":"[5] Chipeta J., A Review of E-government Development in Africa A case of Zambia, Journal of e-Government Studies and Best Practices, Vol. 2018 (2018), Article ID 973845, DOI:10.5171\/2018.973845"},{"key":"2022042707443484448_j_comp-2019-0018_ref_006_w2aab3b7c17b1b6b1ab1ab6Aa","unstructured":"[6] Li X., He X., Zhang Y., The impact of social media on the business performance of small firms in China, Journal of Information Technology for Development, 2019, 1\u201323, DOI: https:\/\/doi.org\/10.1080\/02681102.2019.159466110.1080\/02681102.2019.1594661"},{"key":"2022042707443484448_j_comp-2019-0018_ref_007_w2aab3b7c17b1b6b1ab1ab7Aa","unstructured":"[7] Kuboye B. M., Gabriel A. J., Thompson A. F., Joseph V. O., Analysis of algorithms in long term evolution (LTE) network, Journal of Computer Science and Its Application, 2018, 25(2), 59-71"},{"key":"2022042707443484448_j_comp-2019-0018_ref_008_w2aab3b7c17b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] Pham Q. C., Tran X. P., Misra S., Maskeliunas R., Dama\u0161evicius R., Relationship between Convenience, Perceived Value, and Repurchase Intention in Online Shopping in Vietnam, Journal of Sustainability 2018, 10, 156; doi:10.3390\/su10010156, www.mdpi.com\/journal\/sustainability10.3390\/su10010156","DOI":"10.3390\/su10010156"},{"key":"2022042707443484448_j_comp-2019-0018_ref_009_w2aab3b7c17b1b6b1ab1ab9Aa","unstructured":"[9] Gabriel A. J., Egwuche S. O., Modelling the Employees\u2019 Activities of Public Service Sector using Production Rules. Anale. Seria Informatic\u0103. Vol. XIII fasc. 2 \u2013 2015 Annals. Computer Science Series, University of Timisoara, Romania, 2015, 13(2), 65-68"},{"key":"2022042707443484448_j_comp-2019-0018_ref_010_w2aab3b7c17b1b6b1ab1ac10Aa","unstructured":"[10] Iwasokun G. B. Egwuche O. S., Gabriel A. J., Neural Network-Based Health Personnel Monitoring System, African Journal of Computing & ICT; IEEE, 2015, 8(1), 79-87"},{"key":"2022042707443484448_j_comp-2019-0018_ref_011_w2aab3b7c17b1b6b1ab1ac11Aa","unstructured":"[11] Agboola A. H., Gabriel A. J., Aliyu E. O., Alese B. K., Development of a Fuzzy Logic Based Rainfall Prediction Model, International Journal of Engineering and Technology, 2013, 3(4), 427-435, ISSN: 2049-3444."},{"key":"2022042707443484448_j_comp-2019-0018_ref_012_w2aab3b7c17b1b6b1ab1ac12Aa","unstructured":"[12] Abo-Rizka M., Ghounam H. R., A Novel E-voting in Egypt, International Journal of Computer Science and Network Security, 2007, 7(11), 226-234"},{"key":"2022042707443484448_j_comp-2019-0018_ref_013_w2aab3b7c17b1b6b1ab1ac13Aa","unstructured":"[13] Alok K., Atul K., A Novel Approach for Secure Mobile-Voting using Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme, International Journal of Technology and Engineering System (IJTES), 2011, 2(1), 8-11"},{"key":"2022042707443484448_j_comp-2019-0018_ref_014_w2aab3b7c17b1b6b1ab1ac14Aa","unstructured":"[14] Cetinkaya O. and Koc M. L, Practical Aspects of DynaVote; E-voting Protocol. Electronic Journal of E-Government, 2009, 7(4), 327-338"},{"key":"2022042707443484448_j_comp-2019-0018_ref_015_w2aab3b7c17b1b6b1ab1ac15Aa","unstructured":"[15] Ibrahim S., Kamat M., Salleh M., Abdul-Aziz S., 2003, Secure voting using blind signature available at URL http:\/\/eprints.utm.my\/3262\/1\/IEEE02_EVS_full_paper_ver14Nov.pdf, Retrieved on November 17th 2017"},{"key":"2022042707443484448_j_comp-2019-0018_ref_016_w2aab3b7c17b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] Gabriel A. J., Alese B. K., Adetunmbi A. O., Adewale O. S., Post-Quantum Crystography based Security Framework for Cloud Computing, Journal of Internet Technology and Secured Transactions (JITST), 2015, 4(1), 351-35710.20533\/jitst.2046.3723.2015.0044","DOI":"10.20533\/jitst.2046.3723.2015.0044"},{"key":"2022042707443484448_j_comp-2019-0018_ref_017_w2aab3b7c17b1b6b1ab1ac17Aa","doi-asserted-by":"crossref","unstructured":"[17] Subashini S. and Kavitha, V., A Survey on Security Minimal issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 2011, 34(1), 1-1110.1016\/j.jnca.2010.07.006","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"2022042707443484448_j_comp-2019-0018_ref_018_w2aab3b7c17b1b6b1ab1ac18Aa","doi-asserted-by":"crossref","unstructured":"[18] Rura L., Isaac B., Haldar M. K., Secure Electronic Voting System Based on Image Steganography. Proceedings of IEEE Conference on Open Systems (ICOS2011), IEEE, September 25-28, Langwi, Malaysia. 201110.1109\/ICOS.2011.6079268","DOI":"10.1109\/ICOS.2011.6079268"},{"key":"2022042707443484448_j_comp-2019-0018_ref_019_w2aab3b7c17b1b6b1ab1ac19Aa","unstructured":"[19] Okediran O. O., Omidiora E. O., Olabiyisi S.O, Ganiyu R. A, Alo O.O., A framework for a Multifaceted Electronic Voting System, International Journal of Applied Sciences, 2011a, 1(4), 135-142"},{"key":"2022042707443484448_j_comp-2019-0018_ref_020_w2aab3b7c17b1b6b1ab1ac20Aa","unstructured":"[20] Alese B. K., Philemon E. D., Falaki S. O. Comparative Analysis of Public Key Encryption Schemes. International Journal of Engineering and Technology, 2012, 2(9)"},{"key":"2022042707443484448_j_comp-2019-0018_ref_021_w2aab3b7c17b1b6b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] Gabriel A. J., Alese B. K., Adetunmbi A. O., Adewale O. S., Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography, The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-sponsored by IEEE UK\/RI Computer Chapter, 9th-12th December 2013, London, UK, 454-45710.1109\/ICITST.2013.6750240","DOI":"10.1109\/ICITST.2013.6750240"},{"key":"2022042707443484448_j_comp-2019-0018_ref_022_w2aab3b7c17b1b6b1ab1ac22Aa","unstructured":"[22] Olaniyi, O. M., Arulogun O. T., Omidiora E. O., Okediran O. O., A Survey of Cryptographic and Stegano-Cryptographic Models for Secure Electronic Voting System, Covenant Journal of Informatics and Communication Technology (CJICT), 2013, 1(2), 54-73"},{"key":"2022042707443484448_j_comp-2019-0018_ref_023_w2aab3b7c17b1b6b1ab1ac23Aa","unstructured":"[23] Rajyaguru M. H., CRYSTOGRAPHY - Combination of Cryptography and Steganography With Rapidly Changing Keys. International Journal Technology and Advanced Engineering Website: www.ijetae.com ISSN 2250-2459, 2012, 2(10)"},{"key":"2022042707443484448_j_comp-2019-0018_ref_024_w2aab3b7c17b1b6b1ab1ac24Aa","unstructured":"[24] Daodu M. N., Gabriel A. J. Alese B. K., Adetunmbi A. O., A Data Encryption Standard (DES) based Web Services Security Architecture, Annals of Computer Sscience Series, Tibiscus University, 2016, 14(2), 53-58"},{"key":"2022042707443484448_j_comp-2019-0018_ref_025_w2aab3b7c17b1b6b1ab1ac25Aa","unstructured":"[25] Alese B. K., Gabriel A. J., Olukayode O., Daramola O. A., Modelling of Risk Management Procedures for Cybercrime Control Systems, Proceedings of the World Congress on Engineering (WCE 2014) London, United Kingdom, ISBN: 978-988-19252-7-5"},{"key":"2022042707443484448_j_comp-2019-0018_ref_026_w2aab3b7c17b1b6b1ab1ac26Aa","unstructured":"[26] Petzoldt A. (2013). Selecting and Reducing Key sizes for Multivariate Cryptography. PhD. Thesis., Technical University Darmstadt, Germany, 2013"},{"key":"2022042707443484448_j_comp-2019-0018_ref_027_w2aab3b7c17b1b6b1ab1ac27Aa","doi-asserted-by":"crossref","unstructured":"[27] Shor P., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing. 1997, 26(5), 1484-150910.1137\/S0097539795293172","DOI":"10.1137\/S0097539795293172"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/comp\/9\/1\/article-p292.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0018\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0018\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T08:23:30Z","timestamp":1651047810000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2019-0018\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,9,26]]},"published-print":{"date-parts":[[2019,1,1]]}},"alternative-id":["10.1515\/comp-2019-0018"],"URL":"https:\/\/doi.org\/10.1515\/comp-2019-0018","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}