<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0120-6230</journal-id>
<journal-title><![CDATA[Revista Facultad de Ingeniería Universidad de Antioquia]]></journal-title>
<abbrev-journal-title><![CDATA[Rev.fac.ing.univ. Antioquia]]></abbrev-journal-title>
<issn>0120-6230</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad de Antioquia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0120-62302014000300002</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[An e-voting system for Android Smartphones]]></article-title>
<article-title xml:lang="en"><![CDATA[Sistema de votación electrónica para teléfonos inteligentes Android]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López García]]></surname>
<given-names><![CDATA[Lourdes]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
<xref ref-type="aff" rid="A04"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López Chau]]></surname>
<given-names><![CDATA[Asdrúbal]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Silva Pérez]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[León Chávez]]></surname>
<given-names><![CDATA[Miguel]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universitario UAEM Zumpango  ]]></institution>
<addr-line><![CDATA[Estado de México ]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Centro de Investigación y de Estudios Avanzados del IPN  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="A03">
<institution><![CDATA[,Benemérita Universidad Autónoma de Puebla  ]]></institution>
<addr-line><![CDATA[Puebla ]]></addr-line>
<country>México</country>
</aff>
<aff id="A04">
<institution><![CDATA[,Centro Universitario UAEM Zumpango  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2014</year>
</pub-date>
<numero>72</numero>
<fpage>9</fpage>
<lpage>19</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0120-62302014000300002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0120-62302014000300002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0120-62302014000300002&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been the main tools to implement electronic voting systems (e-voting). Some years ago, mobile devices had not been considered due to their storage restrictions and low computational power; however, nowadays the technology in these devices has advanced and it is possible to implement complicated applications that offer security services such as confidentiality and authentication. In this paper, a reliable and efficient e-voting system for Android Smartphone is implemented. The e-voting proposed herein is composed of three entities: the authentication server (AS), the voting server (VS) and the voter (V) which runs on an Android Smartphone. Two short messages, between V and AS, are necessary to generate an electronic ballot. In order to cast a vote, one more message containing the ballot is sent from V to VS. Bilinear pairing functions are used to verify the signatures contained in the electronic ballot. Each ballot has short lengths, implying improvements in transmission times. Additionally, considering that the most costly operations such as bilinear pairing are not performed in V, the results obtained in tests show that the e-voting system is efficient.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Los procesos electorales que utilizan dispositivos electrónicos permiten a los votantes emitir su voto de forma electrónica. Dispositivos tales como las computadoras de escritorio, las máquinas de registro directo (DRE), tarjetas inteligentes, etc., junto con las redes privadas o el Internet han sido las herramientas principales para implementar sistemas electrónicos de votación. Años atrás, los dispositivos móviles no habían sido considerados debido a sus restricciones en almacenamiento y poco poder de procesamiento; sin embargo, en la actualidad, la tecnología en estos dispositivos ha evolucionado, y es posible implementar aplicaciones cada vez más completas, que consideran los servicios de seguridad como son la confidencialidad y la autenticación. En este artículo, un sistema de votación electrónica (e-voting) es implementado para teléfonos inteligentes Android. El sistema está compuesto de tres entidades: Servidor de Autenticación (SA), Servidor de Votación (SV) y el votante (V) el cual se ejecuta en un teléfono inteligente Android. Dos mensajes de longitud corta son necesarios para generar una boleta electrónica entre el V y el SA. Con la finalidad de emitir el voto, la boleta es enviada en un mensaje más, del V al SV. Las funciones de emparejamiento bilineales son usadas para verificar las firmas contenidas en la boleta electrónica, la cual tiene una longitud corta, por tanto, el tiempo de transmisión es muy corto. Adicionalmente, considerando que las operaciones más costosas, como el emparejamiento bilineal, no son ejecutadas en el V, los resultados obtenidos de las pruebas muestran que el sistema de votación electrónica es muy eficiente.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[E-voting]]></kwd>
<kwd lng="en"><![CDATA[digital signatures]]></kwd>
<kwd lng="en"><![CDATA[bilinear pairing]]></kwd>
<kwd lng="en"><![CDATA[mobile devices]]></kwd>
<kwd lng="es"><![CDATA[Votaciones electrónicas]]></kwd>
<kwd lng="es"><![CDATA[firmas digitales]]></kwd>
<kwd lng="es"><![CDATA[emparejamientos bilineales]]></kwd>
<kwd lng="es"><![CDATA[dispositivos móviles]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <font face="Verdana" size="2">     <p align="right"><b>ART&Iacute;CULO ORIGINAL</b></p>     <p align="right">&nbsp;</p>     <p align="center"><font size="4"> <b>An e-voting system for Android Smartphones</b></font></p>     <p align="center">&nbsp;</p>     <p align="center"><font size="3"> <b>Sistema de votaci&oacute;n electr&oacute;nica para tel&eacute;fonos inteligentes Android</b></font></p>     <p align="center">&nbsp;</p>     <p align="center">&nbsp;</p>     <p> <i><b>Lourdes L&oacute;pez Garc&iacute;a<sup>1*</sup> , Asdr&uacute;bal L&oacute;pez Chau<sup>1</sup>, Javier Silva P&eacute;rez<sup>2</sup>, Miguel Le&oacute;n Ch&aacute;vez<sup>3</sup></b></i></p>       <p><sup>1</sup>1Centro Universitario UAEM Zumpango, Computer Engineering Department, Camino viejo a Jilotzingo continuaci&oacute;n calle Ray&oacute;n, Valle Hermoso. C.P. 55600. Estado de M&eacute;xico, M&eacute;xico.</p>      ]]></body>
<body><![CDATA[<p><sup>2</sup>2Centro de Investigaci&oacute;n y de Estudios Avanzados del IPN, Computer Science Department, Av. IPN 2508, San Pedro Zacatenco. C.P. 07360. M&eacute;xico, D.F., M&eacute;xico.</p>      <p><sup>3</sup>3Benem&eacute;rita Universidad Aut&oacute;noma de Puebla, Computer Science Department. Av. San Claudio y 14 sur, Ciudad Universitaria. C.P. 72570. Puebla, M&eacute;xico.</p>      <p><sup>*</sup>Autor de correspondencia: tel&eacute;fono:: + 52 591 9174140, correo electr&oacute;nico: <a href="mailto:mllopezg@uaemex.mx">mllopezg@uaemex.mx</a> (L. L&oacute;pez)</p>      <p>&nbsp;</p>     <p align="center">(Received February 15, 2013; accepted May 06, 2014)</p>     <p align="center">&nbsp;</p>     <p align="center">&nbsp;</p> <hr noshade size="1">      <p><font size="3"><b>Abstract</b></font></p>      <p>Electoral processes using electronic devices allow voters to cast electronically. Devices such as personal computers, Direct Record Machines (DRE) voting machines, and smartcards, among others, in conjunction with private nets or the Internet have been the main tools to implement electronic voting systems (e-voting). Some years ago, mobile devices had not been considered due to their storage restrictions and low computational power; however, nowadays the technology in these devices has advanced and it is possible to implement complicated applications that offer security services such as confidentiality and authentication. In this paper, a reliable and efficient e-voting system for Android Smartphone is implemented. The e-voting proposed herein is composed of three entities: the authentication server (AS), the voting server (VS) and the voter (V) which runs on an Android Smartphone. Two short messages, between V and AS, are necessary to generate an electronic ballot. In order to cast a vote, one more message containing the ballot is sent from V to VS. Bilinear pairing functions are used to verify the signatures contained in the electronic ballot. Each ballot has short lengths, implying improvements in transmission times. Additionally, considering that the most costly operations such as bilinear pairing are not performed in V, the results obtained in tests show that the e-voting system is efficient. </p>       <p><i>Keywords:</i>E-voting, digital signatures, bilinear pairing, mobile devices</p>  <hr noshade size="1">      ]]></body>
<body><![CDATA[<p><font size="3"><b>Resumen</b></font></p>      <p>Los procesos electorales que utilizan dispositivos electr&oacute;nicos permiten a los votantes emitir su voto de forma electr&oacute;nica. Dispositivos tales como las computadoras de escritorio, las m&aacute;quinas de registro directo (DRE), tarjetas inteligentes, etc., junto con las redes privadas o el Internet han sido las herramientas principales para implementar sistemas electr&oacute;nicos de votaci&oacute;n. A&ntilde;os atr&aacute;s, los dispositivos m&oacute;viles no hab&iacute;an sido considerados debido a sus restricciones en almacenamiento y poco poder de procesamiento; sin embargo, en la actualidad, la tecnolog&iacute;a en estos dispositivos ha evolucionado, y es posible implementar aplicaciones cada vez m&aacute;s completas, que consideran los servicios de seguridad como son la confidencialidad y la autenticaci&oacute;n. En este art&iacute;culo, un sistema de votaci&oacute;n electr&oacute;nica (e-voting) es implementado para tel&eacute;fonos inteligentes Android. El sistema est&aacute; compuesto de tres entidades: Servidor de Autenticaci&oacute;n (SA), Servidor de Votaci&oacute;n (SV) y el votante (V) el cual se ejecuta en un tel&eacute;fono inteligente Android. Dos mensajes de longitud corta son necesarios para generar una boleta electr&oacute;nica entre el V y el SA. Con la finalidad de emitir el voto, la boleta es enviada en un mensaje m&aacute;s, del V al SV. Las funciones de emparejamiento bilineales son usadas para verificar las firmas contenidas en la boleta electr&oacute;nica, la cual tiene una longitud corta, por tanto, el tiempo de transmisi&oacute;n es muy corto. Adicionalmente, considerando que las operaciones m&aacute;s costosas, como el emparejamiento bilineal, no son ejecutadas en el V, los resultados obtenidos de las pruebas muestran que el sistema de votaci&oacute;n electr&oacute;nica es muy eficiente.</p>      <p><i>Palabras clave:</i>Votaciones electr&oacute;nicas, firmas digitales, emparejamientos bilineales, dispositivos m&oacute;viles </p>  <hr noshade size="1">      <p>&nbsp;</p>      <p><font size="3"><b>Introduction</b></font></p>      <p>Until few years ago, electronic devices such as desktop computers, DRE voting machines, smart cards, etc. along with private nets or the Internet had been the key components of most e-voting systems. Recently, the advances in technology have allowed sophisticated implementations for different mobile devices such as Tablets and Smartphones. Nowadays, all Smartphones have access to the Internet, and a large number of electronic transactions occur at every moment. Currently, it is possible to implement applications with hard constraints that include the use of security services such as the confidentiality and the authentication. As is known, an e-voting is a prime example in which the use of security services is quite necessary in order to cast a vote in a private way; in addition, it is necessary to consider the requirements that a secure e-voting must meet &#91;1&#93;.</p>      <p>&#8226;	Voter privacy (Anonymity): any entity must not be able to associate a voter with a vote. This requirement must be preserved during and after the election.</p>     <p>&#8226	Eligibility: only eligible voters participate in the election.</p>     <p>&#8226	Uniqueness: just one vote per voter should be counted.</p>     <p>&#8226	Fairness: no partial tally is revealed before the end of the voting period, i.e., electoral authorities should not be able to anticipate the results before the tally.</p>     ]]></body>
<body><![CDATA[<p>&#8226	No-coercion: any entity should not be able to extract the value of the vote from the ballot.</p>     <p>&#8226	Accuracy: tally should be correctly computed from correctly cast votes.</p>     <p>&#8226	Receipt-freeness: the system should not provide a confirmation of the receipt of the vote, which can be used to prove the value of the vote to a third party.</p>      <p>To fulfill the majority of previously listed requirements, many secure e-voting protocols have been proposed by several authors. In literature, two main classes can be found, mainly, protocols based on blind signatures and protocols based on homomorphic functions &#91;2&#93;.</p>      <p>Among the e-voting systems implemented for mobile devices, itcanbementioned several systems that use different applications and cryptography operations. For instance, in &#91;3&#93; is proposed an e-voting scheme based on VoteBox system which employs homomorphic encryption of ElGamal variant, non-interactive Zero Knowledge and a bulletin board. Another system is proposed in &#91;4&#93; which is a voting software that can be started from within an application called E-Chalk; it is an e-voting in the classroom for educational proposes. In &#91;5&#93; is developed an efficient mobile voting system based on elliptic curves. They used a combination of the elliptic curve cryptography with the ElGamal encryption and the symmetric cryptography with the AES 128-bit to obtain better efficiency. Finally, &#91;6&#93; proposed an e-voting scheme which is the version to mobile devices of the Caltech/Mit Voting System. They used the distributed Paillier's encryption scheme as the main cryptography operation. None of which have considered implementations using bilinear pairing cryptography.</p>      <p>In this work, an e-voting system suitable for mobile devices (Smartphones) with Android Operating System (O.S.) is introduced. The e-voting system offers a reliable election through a secure and efficient e-voting protocol. The system is based on the e-voting protocol proposed in &#91;7&#93; to generate secure small ballots. These ballots consist of two bilinear pairing digital signatures with their respective messages. In the revised literature, there are not e-voting systems similar to the presented in this paper. Other implementations use different security schemes and are developed for other operating systems. The use of Android operating system is supported on the fact that it is the most popular operating system for Smartphones, currently reaching more than 50% of the smartphone market.</p>      <p>The rest of this paper is organized as follows. Section II describes the mathematical background used by the cryptography tools that are utilized by the system. Section III presents the architecture of the e-voting system. Section IV shows the implementation of a cryptography library. Section V presents the functionality of the e-voting scheme among the Voter and the Servers. Finally, conclusions are given in Section VI.</p>      <p>&nbsp;</p>      <p><font size="3"><b>Mathematical background</b></font></p>      <p>The proposed e-voting system is based on bilinear pairing according to the layer model showed in <a href="#Figura1">figure 1</a>. The first layer is considered the modular arithmetic of prime field <i>F<sub>p</sub></i>. The second layer consists of both basic operations of elliptic curves (addition and double of points, scalar multiplication) and the basic operations of the tower field constructed by <i>F<sub>p</sub></i>, <i>F<sub>pk1</sub></i>, <i>F<sub>pk1k2</sub></i>, which are used by the bilinear pairing function. The third layer has both the bilinear pairing function and the special function called mat-to-point which are the main blocks in schemes based on bilinear pairings presented in the fourth layer. The next layer consists of the implementation of security protocols among the electoral entities and the voter. Finally, the sixth layer is considered the e-voting system on Smartphone.</p>      ]]></body>
<body><![CDATA[<p align="center"><a name="Figura1"></a><img src="img/revistas/rfiua/n72/n72a02i01.gif"></p>      <p><font size="3"><b><i>A. Elliptic curves and bilinear pairings</i></b></font></p>      <p>Let <i>E</i>(<i>F<sub>pm</sub></i>) be an elliptic curve defined over finite field <i>F<sub>pm</sub></i> as in &#91;8&#93;. Given the elliptic points <i>P, Q, R, S</i> &isin; <i>E</i>(<i>F<sub>pm</sub></i>), the operations <i>R=P+Q</i> and <i>S=P+P</i> are defined as point addition and point doubling respectively. Let <i>k</i> be a positive integer and <i>P</i> &isin; <i>E</i>(<i>F<sub>pm</sub></i>). Then the elliptic curve scalar multiplication is the operation that computes the multiple <i>Q=kP</i>, defined as the point resulting of adding <i>P</i> + ... + <i>P</i>, <i>k</i> times.</p>      <p>Let <i>r</i> be a prime number. Let (G<sub>1</sub>, G<sub>2</sub>) be two additive groups with identity O and G<sub>T</sub> be a multiplicative group with 1 as its identity, all of them of order <i>r</i>. The bilinear pairing is defined on (G<sub>1</sub>, G<sub>2</sub>) as a function <img src="img/revistas/rfiua/n72/n72a02e02a.gif"> satisfying the following properties:</p>      <p>&#8226	Bilinearity: for all <img src="img/revistas/rfiua/n72/n72a02e03a.gif"> </p>     <p>&#8226	<img src="img/revistas/rfiua/n72/n72a02e04a.gif"></p>     <p>&#8226	Non-degeneracy: <img src="img/revistas/rfiua/n72/n72a02e05a.gif"> or Q=O</p>     <p>&#8226	<i>&ecirc;</i> can be efficiently computed.</p>      <p>The bilinearity property implies that, given <i>a</i>, <i>b</i> &isin; <i>Z<sub>r</sub></i>  <img src="img/revistas/rfiua/n72/n72a02e06a.gif">  When G<sub>1</sub>, G<sub>2</sub>, the bilinear pairing is called symmetric, otherwise is named asymmetric. </p>      <p><font size="3"><b><i>B. Special map to point function</i></b></font></p>       ]]></body>
<body><![CDATA[<p>H<sub>1</sub> is a special hash function called <i>map-to- point</i>. This function maps an arbitrary string into a point in an elliptic curve &#91;9&#93;. Let H<sub>1</sub> be an additive group, the special function map-to- point is defined as H<sub>1</sub>:  <img src="img/revistas/rfiua/n72/n72a02e09a.gif"> . To guarantee the security of the function H<sub>1</sub> must fulfill all properties of the standard hash functions.</p>      <p><font size="3"><b><i>C.	Short signature scheme</i></b></font></p>       <p>The short signature proposed in &#91;10&#93;, is a useful digital signature in environments with bandwidth constrains. This scheme has the property that the Computational Diffie-Hellman Problem is hard, but the Decisional Diffie-Hellman Problem is easy on certain additive groups generated by base points on an elliptic curve defined over a finite field.</p>      <p>This short signature scheme consists of three algorithms defined as follows: let <img src="img/revistas/rfiua/n72/n72a02e10a.gif"> be additive groups of order prime r where P and <i>Q</i> are points over an elliptic curve.</p>       <p>1.	<i>Key generation</i>. Pick a random integer <i>d</i> &isin; <i>Z<sub>r</sub></i>, and compute <i>V=dQ</i>. The public key is <i>V</i> &isin; G<sub>2</sub> and the private key is <i>d</i>.</p>       <p>2.	<i>Signing:</i> Given a private key <i>d</i>, a message <i>m</i> <img src="img/revistas/rfiua/n72/n72a02e11a.gif"></p>       <p>3.	<i>Verification</i>. Given a public key <i>V</i>, a message <i>m</i>, and a signature <i>S</i>, verify that <font face="Verdana" size="2"><img src="img/revistas/rfiua/n72/n72a02e12a.gif"></font> is a valid Diffie-Hellman tuple, i.e., if DDHP is solved, the signature is valid, otherwise it is invalid. Using the bilinear pairing function, the verification checks whether <img src="img/revistas/rfiua/n72/n72a02e07a.gif"> holds.</p>       <p><font size="3"><b><i>D.	Blind signature scheme</i></b></font></p>      <p>A blind signature is a class of digital signature where the message is <i>hidden</i> before signed &#91;11&#93;. The process to generate a blind signature requires two additional algorithms only known by the signature requester: blinding c and unblinding c' such that <img src="img/revistas/rfiua/n72/n72a02e13a.gif">, where s is the signing function and m is the message.</p>      <p>The blind signature scheme proposed in &#91;12&#93; consists of five algorithms and uses the domain parameters defined as the same way that the short signature of Boneh.</p>      ]]></body>
<body><![CDATA[<p>1.	<i>Key generation.</i> Pick a random integer <i>d&isin;Z<sub>r</sub></i>, and compute <i>V=dQ.</i> The public key is Ve G<sub>2</sub> and d is the private key.</p>      <p>2.	<i>Blinding</i> (user). Given a message <i>m</i>, calculate <i>M=Hx(m)</i>, randomly find b&isin;Z* and compute <img src="img/revistas/rfiua/n72/n72a02e20a.gif">=bM.</p>      <p>3.	<i>Signature</i> (signer). Given a blind message <img src="img/revistas/rfiua/n72/n72a02e20a.gif"> and private key of the signer <i>d</i>, compute <img src="img/revistas/rfiua/n72/n72a02e21a.gif"> = <img src="img/revistas/rfiua/n72/n72a02e20a.gif"> </p>      <p>4.	<i>Unblinding</i> (user). Given a blind signature <img src="img/revistas/rfiua/n72/n72a02e21a.gif"> and a blind factor <i>b</i>, calculate <i>S=b<sup>-1</sup> <img src="img/revistas/rfiua/n72/n72a02e21a.gif"></i> ; Then S&isin;Gx is the signature of the message <i>m</i>.</p>      <p>5.	<i>Verification</i> (third party). Given a message <i>m</i>, a signature <i>S</i>, and the public key <i>V</i> of the signer, check whether <img src="img/revistas/rfiua/n72/n72a02e14a.gif"> holds.</p>       <p>&nbsp;</p>        <p><font size="3"><b>Architecture of the e-voting system</b></font></p>         <p align="center"><a name="Figura2"></a><img src="img/revistas/rfiua/n72/n72a02i02.gif"></p>        <p>The architecture of the proposed e-voting system is presented in <a href="#Figura2">figure 2</a>. It is composed of two servers and one or more Android Smartphones. The e-voting protocol has two electoral entities and the voter. The interaction between the voter and these electoral entities is divided into four phases:</p>      <p><b><i>Registration phase:</i></b> the voter must be registered by an electoral entity called Register Server (RS) which generates the nominal list that contains all valid voters and their electoral identities.</p>      ]]></body>
<body><![CDATA[<p><b><i>Authentication phase:</i></b> the goal during this phase is to generate a blank ballot for all valid voters registered in the nominal list. The blank ballot, signed by Authentication Server (AS), consists of one digital signature which will certificate the validity of the ballot in the voting phase.</p>      <p><b><i>Voting phase:</i></b> in this phase, the voter generates and sends the ballot to Voting Server (VS), which is responsible to receive, verify and storage it. The ballot consists of both the authorization signature generated by AS and the signature of the vote to protect it of possible modifications. To receive the ballot, the VS verify both signatures. If both signatures are valid, then the ballot is stored as valid, otherwise it is invalid. Finally, the VS generates an acknowledge using all information of the ballot and sends it to the voter.</p>      <p><i><b>Counting phase:</b></i>the VS tell the votes and publish the result of the election.</p>       <p><font size="3"><b><i>E-voting protocol dataflow</i></b></font></p>        <p>In a previous phase called Registration phase, the public keys of the voters as well as the electoral servers are generated by an RS. The RS sends the nominal list to the AS. This list contains all information of the voters, including their digital certificates. Finally, the electoral servers publish their public keys for verifying the signatures.</p>        <p>The steps to produce an electronic ballot are just the generation of two digital signatures (short signature of Boneh and blind signature of Boldyreva mentioned above) which require the minimal cryptography operations. The protocol between the voter and the electoral entities &#91;7&#93;, presented in <a href="#Figura3">figure 3</a>, uses as domain parameters the tuple (G<sub>1</sub>, G<sub>2</sub>, <i>r P Q,</i> H<sub>1</sub>) and the next notation:</p>        <p>&#8226	<i>ID<sub>x</sub>,d<sub>x</sub>,V<sub>x</sub></i>: Identifier and private/public key pair of the entity <i>X</i></p>       <p>&#8226	<i>d<sub>t</sub>,V<sub>t</sub></i>: Alias private key and alias public key generated by the Voter.      <p><i>&#8226 b:</i> Denotes a random blind factor generated by the Voter.</p>     <p><i>&#8226 m2s:</i><img src="img/revistas/rfiua/n72/n72a02e15a.gif"> Is the function that maps a point in the additive group G<sub>2</sub> to a string of <i>k</i>-bits length.</p>     ]]></body>
<body><![CDATA[<p>&#8226 <i>H:</i> Denotes a hash function. </p>      <p align="center"><a name="Figura3"></a><img src="img/revistas/rfiua/n72/n72a02i03.gif"></p>         <p>&nbsp;</p>       <p><font size="3"><b>Library implementation</b> </font></p>      <p>Two cryptographic libraries were developed in the Java language, the libraries run on the Servers (AS and VS) and on each Android Smartphone (V). For the reported results, the tests were executed on the following hardware. Each Server is a computer Intel Core i5 @ 2.53 GHz processor, 4 GB RAM, Linux Ubuntu 11.04 O.S. The Smartphone is a Sony Xperia S LT26i, ARMv7 Processor rev 4 @ 1.512 MHz, the O.S. is Android 2.3.3.</p>      <p><a href="#Tabla1">table 1</a> presents the cryptographic operations that are used by the e-voting protocol with the following parametrization: G<sub>1</sub> =&lang;P&rang; is an additive group generated by the base point <i>P&isin;E(<i>F<sub>p</sub></i>); G<sub>2</sub>= &lang;Q&rang;</i> be a group generated by the base point <img src="img/revistas/rfiua/n72/n72a02e16a.gif"> be a multiplicative group; all of them of order |r|=256 bits.</p>      <p>These results correspond to the average of 100 runs of each operation on the Servers and the Smartphone.</p>      <p>The scalar multiplication was implemented into the groups G<sub>1</sub> and G<sub>2</sub> using the <i>w-NAF</i> algorithm &#91;13&#93;, obtaining 5.66 <i>ms</i> and 621.04 <i>ms</i> respectively. The big difference is caused by the length of the elements in G<sub>2</sub> which has points with corresponding polynomial coordinates <img src="img/revistas/rfiua/n72/n72a02e17a.gif"> and <img src="img/revistas/rfiua/n72/n72a02e18a.gif"> where <img src="img/revistas/rfiua/n72/n72a02e19a.gif">.</p>      <p>The bilinear pairing function is the high-speed implementation <i>of ate pairing</i> for desktop computers and it was proposed in &#91;14&#93;. It is public available on the Internet.</p>      <p>It is important to notice that the bilinear pairing function is not available in the library that runs on the Android Smartphone, due to this operation is only required on Servers-side, according to the e-voting protocol implemented.</p>      ]]></body>
<body><![CDATA[<p align="center"><a name="Tabla1"></a><img src="img/revistas/rfiua/n72/n72a02t01.gif" ></p>      <p>The developed e-voting system uses the tools described above. As shown in <a href="#Figura3">figure 3</a>, the e-voting protocol begins with the ballot generated by the voter V (Android Smartphone) and the AS, followed by the transmission of the ballot to the VS.</p>      <p>The operations performed on the voter side are four scalar multiplications in G<sub>1</sub> and one more in G<sub>2</sub>. On Serves-side, two scalar multiplications in G<sub>1</sub>, and six bilinear pairing functions are executed, during the authentication and voting phases.</p>      <p>It can be seen that the most expensive operations are not computed by the Android Smartphone, this makes efficient the developed e-voting system.</p>      <p><a href="#Tabla2">table 2</a> presents the number of cryptographic operations that are required by each entity (Smartphone and Servers) according to the phase of the e-voting protocol.</p>      <p align="center"><a name="Tabla2"></a><img src="img/revistas/rfiua/n72/n72a02t02.gif" ></p>       <p><a href="#Tabla3">table 3</a> shows the total CPU time required by the protocol to complete a session between the voter and the Servers.</p>      <p align="center"><a name="Tabla3"></a><img src="img/revistas/rfiua/n72/n72a02t03.gif" ></p>      <p>It is important to mention that in literature there exist many implementations of the bilinear pairings for desktop computers; however, there are currently a few implementations for mobile devices. A version of bilinear pairings for Smartphone is proposed in &#91;15&#93;, where is implemented a cryptographic bilinear pairing library in the Java language for the Windows Mobile O.S. According their results, the CPU times are very competitive for the scalar multiplication on elliptic curves in G<sub>1</sub>. However, as can be seen in table 1, the time for this operation in this paper is 5.66 <i>ms</i>. Besides, they do not implement a scalar multiplication in G<sub>2</sub>, which for the e-voting system implemented, it is quite necessary.</p>       <p><font size="3"><b>E-voting system in the Android Smartphone</b> </font></p>      ]]></body>
<body><![CDATA[<p>The communication between the voter (Android Smartphone) and the electoral Servers is realized using Jersey framework which is used to provide Web Publication Services and to serialize classes with JSON. These classes are show in <a href="#Figura4">figure 4</a>. </p>      <p align="center"><a name="Figura4"></a><img src="img/revistas/rfiua/n72/n72a02i04.gif"></p>      <p><a href="#Tabla4">Table 4</a> shows the transmission times required to develop a complete session among the Servers and the Voter.</p>      <p><font size="3"><b><i>F. Smartphone client</i></b></font></p>      <p>The e-voting system starts with the request of the voter to cast the vote. <a href="#Figura5">figure 5</a> shows the GUI of the system. First, the voter types the ID in the text area control (a). Afterward, the system displays the elections (b) and the candidates (c) using the magnifying glass control, the e-voting protocol starts (d) when the user chooses the candidate.</p>      <p align="center"><a name="Tabla4"></a><img src="img/revistas/rfiua/n72/n72a02t04.gif" ></p>     <p align="center"><a name="Figura5"></a><img src="img/revistas/rfiua/n72/n72a02i05.gif"></p>      <p><font size="3"><b><i>G. Web application</i></b></font></p>      <p>A Web application is used by the electoral entities to register the election also the candidates. The GUI for the electoral entities is shown in <a href="#Figura6">figure 6</a>. It allows the electoral entities to choose the election (a), create a new election (b) registering the name of the election and the number of contenders.</p>      <p align="center"><a name="Figura6"></a><img src="img/revistas/rfiua/n72/n72a02i06.gif"></p>      ]]></body>
<body><![CDATA[<p align="center"><a name="Figura6"></a><img src="img/revistas/rfiua/n72/n72a02i06b.gif"></p>      <p><font size="3"><b><i>H. Election results</i></b></font></p>      <p>At the end of the election, the results are published in a Web page that can be visited using a Web browser. The results show in <a href="#Figura7">figure 7</a> corresponding to mexican presidential election. The candidates are identified with their pictures and manes. For this example, the winner is the PRI candidate.</p>      <p align="center"><a name="Figura7"></a><img src="img/revistas/rfiua/n72/n72a02i07.gif"></p>      <p><font size="3"><b>Conclusions</b></font></p>      <p>This work presents an e-voting system which uses a secure e-voting protocol based on bilinear pairings. The system allows emitting the vote over the Internet through an Android Smartphone. It was necessary to develop two cryptographic libraries, one for the Servers and other for the Android Smartphone. Both libraries implement the scalar multiplication in the G<sub>1</sub> and G<sub>2</sub> groups, besides of the arithmetic operations of elliptic curves.</p>      <p>The implementation of the library in both entities (Android Smartphone and Servers) guarantee the integrity of the vote and the anonymity of the voter using digital signatures and blind signatures based on bilinear pairings. This is very useful in applications that require to guarantee more security without utilize 1024-bit length numbers at least.</p>      <p>The e-voting system requires only for messages to cast an anonymous vote in an election. In the experiments, the measured transmission times corresponding to these messages, in the order of milliseconds units. The time consumed by cryptographic operations on the Android Smartphone is also very short, compared with other implementations. A plus in efficiency is that the most expensive operation -bilinear pairing- is only executed on Servers-side. Then, the developed e-voting system introduced in this work is reliable and efficient.</p>      <p>&nbsp;</p>       <p><font size="3"><b>References</b></font></p>      ]]></body>
<body><![CDATA[<!-- ref --><p>1.	O. Cetinkaya. <i>Analysis of Security Requirements for Cryptographi.</i> International Conference on Availability, Reliability and Security. Barcelona, Spain. 2008. pp. 1451-1456.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000123&pid=S0120-6230201400030000200001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>2.	L. Wang, J. Guo, M. Luo. <i>A More Effective Voting Scheme Based on Blind Signature</i>. International Conference on Computational Intelligence and Security. Guangzhou, China. 2006. pp. 1507-1510.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000125&pid=S0120-6230201400030000200002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>3.	B. Campbell, C. Tossel, M. Byrne, P. Kortum. <i>Voting on a Smartphone: Evaluating the Usability of an Optimized Voting System for Handled Mobile Devices.</i> Human Factors and Ergonomics Society Annual Meeting. Las Vegas, USA. 2011. pp. 1100-1104.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000127&pid=S0120-6230201400030000200003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>4.	M. Esponda. ''Electronic voting on-the-fly with mobile devices''. <i>Journal SIGCE Bull ACM.</i> Volume 40, Issue 3. 2008. pp. 93-97.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000129&pid=S0120-6230201400030000200004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>5.	T. Ahmad, J. Hu, H. Song. <i>An efficient mobile voting system security scheme based on elliptic curve cryptography.</i> 3<sup>rd</sup> International Conference on Network and System Security. Surfers Paradise, Australia. 2009. pp. 474-479.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000131&pid=S0120-6230201400030000200005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      ]]></body>
<body><![CDATA[<!-- ref --><p>6.	Y. Qiu, H. Zhu. <i>Somewhat Secure Mobile Electronic- Voting Systems Based on the Cut-and-Choose Mechanism</i>. Computational Intelligence and Security. Beijing, China. 2009. pp. 446-450.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000133&pid=S0120-6230201400030000200006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>7.	L. L&oacute;pez, L. P&eacute;rez, F. Rodr&iacute;guez. ''A pairing based blind signature e-voting scheme''.<i> The Computer Journal, published online.</i> doi: 10.1093/comjnl/ bxt069. 2013. pp. 1-12.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000135&pid=S0120-6230201400030000200007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>8.	P. Barreto, M. Naehrig. <i>Pairing-friendly elliptic curves of prime order</i>. Selected Areas in Cryptography, Montreal, Canada. 2006. pp. 319-331.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000137&pid=S0120-6230201400030000200008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>     <!-- ref --><p>9.	D. Boneh, M. Franklin. ''Identity-Based Encryption from the Weil Pairing''. <i>Journal on Computing</i>. Vol 32. 2003. pp. 213-229.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000139&pid=S0120-6230201400030000200009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>10.	D. Boneh, H. Shacham, B. Lynn, ''Short Signature from the Weil Pairing''. <i>Journal of Cryptology</i>. Vol. 14. 2004.	pp. 297-319.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000141&pid=S0120-6230201400030000200010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>       ]]></body>
<body><![CDATA[<!-- ref --><p>11.	D. Chaum. <i>Blind Signatures for Untraceable Payments</i>. Advances in Cryptology. Ed. Springer Verlag, Santa Barbara California, USA. 1983. pp. 199-203.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000143&pid=S0120-6230201400030000200011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>12.	A. Boldyreva. <i>Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie- Hellman-Group Signature Scheme</i>. Theory and Practice in Public Key Cryptography. Miami, Florida, USA. 2003. pp. 31-46.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000145&pid=S0120-6230201400030000200012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>13.	D. Hankerson, A. Menezes, S. Vanstone. <i>Guide to Elliptic Curve Cryptography</i>. 1<sup>st</sup> ed. Ed. Springer-Verlag. New York, USA. pp. 96-141.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000147&pid=S0120-6230201400030000200013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>14.	J. Beuchat, J. Gonz&aacute;lez, S. Mitsunari, E. Okamoto, F. Rodr&iacute;guez, T. Teruya. <i>High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves.</i> Pairing-based cryptography, Yamanaka Hot Spring, Japan. 2010. pp. 21-39.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000149&pid=S0120-6230201400030000200014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>      <!-- ref --><p>15.	C. Okida, D. Goya, R. Terada. ''Java Cryptographic Library for Smartphone''. <i>Journal Latin America Transactions IEEE.</i> Vol. 10. 2012. pp.1377-1384.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=000151&pid=S0120-6230201400030000200015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></p>       ]]></body>
<body><![CDATA[<p>&nbsp;</p>     <p>&nbsp;</p>     <p>&nbsp;</p>     <p>&nbsp;</p>     </font>     ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cetinkaya]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis of Security Requirements for Cryptographi]]></source>
<year>2008</year>
<conf-name><![CDATA[ International Conference on Availability, Reliability and Security]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[A More Effective Voting Scheme Based on Blind Signature]]></source>
<year>2006</year>
<conf-name><![CDATA[ International Conference on Computational Intelligence and Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1507-1510</page-range><publisher-loc><![CDATA[Guangzhou ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Campbell]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Tossel]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Byrne]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Kortum]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Voting on a Smartphone: Evaluating the Usability of an Optimized Voting System for Handled Mobile Devices]]></source>
<year>2011</year>
<page-range>1100-1104</page-range><publisher-loc><![CDATA[Las Vegas ]]></publisher-loc>
<publisher-name><![CDATA[Human Factors and Ergonomics Society Annual Meeting]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Esponda]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Electronic voting on-the-fly with mobile devices]]></article-title>
<source><![CDATA[Journal SIGCE Bull ACM]]></source>
<year>2008</year>
<volume>40</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>93-97</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[An efficient mobile voting system security scheme based on elliptic curve cryptography]]></source>
<year>2009</year>
<conf-name><![CDATA[3rd International Conference on Network and System Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>474-479</page-range><publisher-name><![CDATA[Surfers Paradise]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Somewhat Secure Mobile Electronic- Voting Systems Based on the Cut-and-Choose Mechanism]]></source>
<year>2009</year>
<page-range>446-450</page-range><publisher-loc><![CDATA[Beijing ]]></publisher-loc>
<publisher-name><![CDATA[Computational Intelligence and Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A pairing based blind signature e-voting scheme']]></article-title>
<source><![CDATA[The Computer Journal, published online]]></source>
<year>2013</year>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barreto]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Naehrig]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Pairing-friendly elliptic curves of prime order]]></source>
<year>2006</year>
<page-range>319-331</page-range><publisher-loc><![CDATA[Montreal ]]></publisher-loc>
<publisher-name><![CDATA[Selected Areas in Cryptography]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boneh]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Franklin]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Identity-Based Encryption from the Weil Pairing]]></article-title>
<source><![CDATA[Journal on Computing]]></source>
<year>2003</year>
<volume>32</volume>
<page-range>213-229</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boneh]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Shacham]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Lynn]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Short Signature from the Weil Pairing]]></article-title>
<source><![CDATA[Journal of Cryptology]]></source>
<year>2004</year>
<volume>14</volume>
<page-range>297-319</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chaum]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Blind Signatures for Untraceable Payments]]></source>
<year>1983</year>
<page-range>199-203</page-range><publisher-loc><![CDATA[Santa Barbara California ]]></publisher-loc>
<publisher-name><![CDATA[Ed. Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boldyreva]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie- Hellman-Group Signature Scheme]]></source>
<year>2003</year>
<page-range>31-46</page-range><publisher-loc><![CDATA[MiamiFlorida ]]></publisher-loc>
<publisher-name><![CDATA[Theory and Practice in Public Key Cryptography]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hankerson]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Menezes]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Vanstone]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Guide to Elliptic Curve Cryptography]]></source>
<year></year>
<edition>1st</edition>
<page-range>96-141</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Ed. Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beuchat]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Mitsunari]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Okamoto]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Teruya]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves]]></source>
<year>2010</year>
<page-range>21-39</page-range><publisher-name><![CDATA[Pairing-based cryptography, Yamanaka Hot Spring]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Okida]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Goya]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Terada]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Java Cryptographic Library for Smartphone]]></article-title>
<source><![CDATA[Journal Latin America Transactions IEEE]]></source>
<year>2012</year>
<volume>10</volume>
<page-range>1377-1384</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
