{"id":"https://openalex.org/W4416799391","doi":"https://doi.org/10.1109/snpd65828.2025.11254558","title":"Post-Quantum Secure Protocol for Confidential and Auditable Data Transmission","display_name":"Post-Quantum Secure Protocol for Confidential and Auditable Data Transmission","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4416799391","doi":"https://doi.org/10.1109/snpd65828.2025.11254558"},"language":null,"primary_location":{"id":"doi:10.1109/snpd65828.2025.11254558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11254558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ankush Choudhary","orcid":null},"institutions":[{"id":"https://openalex.org/I86519414","display_name":"Algoma University","ror":"https://ror.org/0131d6623","country_code":"CA","type":"education","lineage":["https://openalex.org/I86519414"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ankush Choudhary","raw_affiliation_strings":["Algoma University,School of Computer Science and Technology,Brampton,Canada"],"affiliations":[{"raw_affiliation_string":"Algoma University,School of Computer Science and Technology,Brampton,Canada","institution_ids":["https://openalex.org/I86519414"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091505584","display_name":"Ajmery Sultana","orcid":"https://orcid.org/0000-0002-8591-026X"},"institutions":[{"id":"https://openalex.org/I86519414","display_name":"Algoma University","ror":"https://ror.org/0131d6623","country_code":"CA","type":"education","lineage":["https://openalex.org/I86519414"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ajmery Sultana","raw_affiliation_strings":["Algoma University,School of Computer Science and Technology,Brampton,Canada"],"affiliations":[{"raw_affiliation_string":"Algoma University,School of Computer Science and Technology,Brampton,Canada","institution_ids":["https://openalex.org/I86519414"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046677720","display_name":"Thirumurugan Shanmugam","orcid":"https://orcid.org/0000-0002-0433-891X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thirumurugan Shanmugam","raw_affiliation_strings":["University of Technology and Applied Sciences,College of Computing and Information Sciences,Suhar,Oman"],"affiliations":[{"raw_affiliation_string":"University of Technology and Applied Sciences,College of Computing and Information Sciences,Suhar,Oman","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060532910","display_name":"Rajakumar Arul","orcid":"https://orcid.org/0000-0002-1385-7965"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajakumar Arul","raw_affiliation_strings":["Vellore Institute of Technology,School of Computer Science and Engineering,Chennai,Tamil Nadu,India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology,School of Computer Science and Engineering,Chennai,Tamil Nadu,India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016991392","display_name":"Arunkumar Sivaraman","orcid":null},"institutions":[{"id":"https://openalex.org/I86519414","display_name":"Algoma University","ror":"https://ror.org/0131d6623","country_code":"CA","type":"education","lineage":["https://openalex.org/I86519414"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"ArunKumar Sivaraman","raw_affiliation_strings":["Algoma University,School of Computer Science and Technology,Brampton,Canada"],"affiliations":[{"raw_affiliation_string":"Algoma University,School of Computer Science and Technology,Brampton,Canada","institution_ids":["https://openalex.org/I86519414"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I86519414"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19205511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"992","last_page":"997"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9440000057220459,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9440000057220459,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.025800000876188278,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6549999713897705},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.6450999975204468},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6148999929428101},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.5077999830245972},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.49799999594688416},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4648999869823456},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.45829999446868896},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4268999993801117},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.41690000891685486}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7282999753952026},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6549999713897705},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.6450999975204468},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6359999775886536},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6148999929428101},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.5077999830245972},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.49799999594688416},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4648999869823456},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.45829999446868896},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4268999993801117},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.41690000891685486},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3986999988555908},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3912999927997589},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.37880000472068787},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.3483999967575073},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3409000039100647},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.33980000019073486},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.3391999900341034},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3203999996185303},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31139999628067017},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.29409998655319214},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.25519999861717224},{"id":"https://openalex.org/C2777094542","wikidata":"https://www.wikidata.org/wiki/Q905151","display_name":"Ballot","level":4,"score":0.25519999861717224},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snpd65828.2025.11254558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11254558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321147","display_name":"Ministry of Higher Education","ror":"https://ror.org/0512bh102"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1559136758","https://openalex.org/W2168676717","https://openalex.org/W2766783464","https://openalex.org/W4286559630"],"related_works":[],"abstract_inverted_index":{"The":[0,91],"advent":[1],"of":[2,13,83,147,161],"quantum":[3,44],"computing":[4],"poses":[5],"a":[6,63,170],"significant":[7,135],"threat":[8],"to":[9,37,40,115,149],"the":[10,80,157],"cryptographic":[11,76],"foundations":[12],"current":[14],"electronic":[15],"voting":[16],"(e-voting)":[17,66],"systems,":[18],"which":[19],"commonly":[20],"rely":[21],"on":[22],"algorithms":[23,34],"such":[24],"as":[25],"Rivest-Shamir-Adleman":[26],"(RSA)":[27],"and":[28,54,85,110,126,144,159,175],"Elliptic":[29],"Curve":[30],"Cryptography":[31],"(ECC).":[32],"These":[33,154],"are":[35],"believed":[36],"be":[38],"vulnerable":[39],"attacks":[41],"imposed":[42],"by":[43,79,142],"computers,":[45],"jeopardizing":[46],"core":[47],"e-voting":[48,70,177],"properties,":[49],"including":[50],"ballot":[51],"secrecy,":[52],"integrity,":[53],"auditability.":[55],"To":[56],"address":[57],"these":[58],"challenges,":[59],"this":[60],"work":[61],"presents":[62],"quantum-resistant":[64],"electronic-voting":[65],"system,":[67],"named":[68],"post-quantum":[69,89,162],"system":[71],"(PQEVS)":[72],"built":[73],"entirely":[74],"upon":[75],"primitives":[77],"standardized":[78],"National":[81],"Institute":[82],"Standards":[84],"Technology":[86],"(NIST)":[87],"for":[88,96,106,124,173],"security.":[90],"proposed":[92],"PQEVS":[93,129],"utilizes":[94],"Dilithium":[95],"secure":[97],"voter":[98,121],"authentication,":[99],"Brakerski/Fan-Vercauteren":[100],"(BFV)-based":[101],"Fully":[102],"Homomorphic":[103],"Encryption":[104],"(FHE)":[105],"privacy-preserving":[107],"vote":[108,117,139],"tallying,":[109],"Picnic-based":[111],"Zero-Knowledge":[112],"Proofs":[113],"(ZKPs)":[114],"ensure":[116],"validity":[118],"without":[119],"compromising":[120],"anonymity.":[122],"Designed":[123],"modularity":[125],"scalability,":[127],"our":[128],"delivers":[130],"enhanced":[131],"security":[132],"while":[133],"achieving":[134],"performance":[136],"gains,":[137],"reducing":[138],"processing":[140],"latency":[141],"85%":[143],"supporting":[145],"throughputs":[146],"up":[148],"36,000":[150],"votes":[151],"per":[152],"second.":[153],"results":[155],"highlight":[156],"practicality":[158],"robustness":[160],"cryptography":[163],"in":[164],"securing":[165],"large-scale":[166],"electoral":[167],"processes,":[168],"setting":[169],"new":[171],"benchmark":[172],"verifiable":[174],"future-proof":[176],"systems.":[178]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-28T00:00:00"}
