{"id":"https://openalex.org/W7128440127","doi":"https://doi.org/10.1186/s13677-026-00839-z","title":"Enhancing privacy and transparency in electronic voting: a blockchain-based cryptographic framework","display_name":"Enhancing privacy and transparency in electronic voting: a blockchain-based cryptographic framework","publication_year":2026,"publication_date":"2026-02-09","ids":{"openalex":"https://openalex.org/W7128440127","doi":"https://doi.org/10.1186/s13677-026-00839-z"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-026-00839-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00839-z","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1186/s13677-026-00839-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125473761","display_name":"Mohamed Galal","orcid":null},"institutions":[{"id":"https://openalex.org/I107613613","display_name":"Information Technology Institute","ror":"https://ror.org/04ynw2g14","country_code":"EG","type":"facility","lineage":["https://openalex.org/I107613613"]},{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Mohamed Galal","raw_affiliation_strings":["Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Alexandria, 21526, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Alexandria, 21526, Egypt","institution_ids":["https://openalex.org/I84524832","https://openalex.org/I107613613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078969602","display_name":"Eman Abd El Reheem","orcid":null},"institutions":[{"id":"https://openalex.org/I107613613","display_name":"Information Technology Institute","ror":"https://ror.org/04ynw2g14","country_code":"EG","type":"facility","lineage":["https://openalex.org/I107613613"]},{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Eman Abd El Reheem","raw_affiliation_strings":["Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Alexandria, 21526, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Alexandria, 21526, Egypt","institution_ids":["https://openalex.org/I84524832","https://openalex.org/I107613613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036884795","display_name":"SHAWKAT K. GUIRGUIS","orcid":null},"institutions":[{"id":"https://openalex.org/I107613613","display_name":"Information Technology Institute","ror":"https://ror.org/04ynw2g14","country_code":"EG","type":"facility","lineage":["https://openalex.org/I107613613"]},{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Shawkat Guirguis","raw_affiliation_strings":["Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Alexandria, 21526, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, Alexandria, 21526, Egypt","institution_ids":["https://openalex.org/I84524832","https://openalex.org/I107613613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5125473761"],"corresponding_institution_ids":["https://openalex.org/I107613613","https://openalex.org/I84524832"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.325281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.0026000000070780516,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7006999850273132},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.6966999769210815},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.6585000157356262},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6344000101089478},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5950999855995178},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5295000076293945},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.4875999987125397},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45730000734329224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7387999892234802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.729200005531311},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7006999850273132},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.6966999769210815},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.6585000157356262},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6344000101089478},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5950999855995178},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5295000076293945},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.4875999987125397},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.45590001344680786},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4408999979496002},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.42730000615119934},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.35199999809265137},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.32499998807907104},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.3244999945163727},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28220000863075256},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2732999920845032},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.26409998536109924},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.25679999589920044}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-026-00839-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00839-z","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a28a2f1131224fa49b2310d2a2aaf39a","is_oa":true,"landing_page_url":"https://doaj.org/article/a28a2f1131224fa49b2310d2a2aaf39a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 15, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-026-00839-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-026-00839-z","pdf_url":null,"source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7053095102310181,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320326056","display_name":"Alexandria University","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2884610574","https://openalex.org/W2964101012","https://openalex.org/W2991049686","https://openalex.org/W2995831815","https://openalex.org/W3012254412","https://openalex.org/W3013349811","https://openalex.org/W3086860991","https://openalex.org/W3143975686","https://openalex.org/W3157908492","https://openalex.org/W3161952257","https://openalex.org/W3169016026","https://openalex.org/W3184600775","https://openalex.org/W3198867935","https://openalex.org/W3211633027","https://openalex.org/W4205518274","https://openalex.org/W4206086299","https://openalex.org/W4213047693","https://openalex.org/W4281639867","https://openalex.org/W4307125545","https://openalex.org/W4382026204","https://openalex.org/W4389947134","https://openalex.org/W4390443933","https://openalex.org/W4394804935","https://openalex.org/W4394961348","https://openalex.org/W4403335084","https://openalex.org/W4404731260","https://openalex.org/W4404737346","https://openalex.org/W4405642531","https://openalex.org/W4409796045","https://openalex.org/W4412376789","https://openalex.org/W4414070041","https://openalex.org/W4415437238","https://openalex.org/W6931040655"],"related_works":[],"abstract_inverted_index":{"Ensuring":[0],"secure,":[1],"private,":[2],"and":[3,24,40,48,96,102,119,136,144],"transparent":[4],"elections":[5,135],"remains":[6],"a":[7,16,32,121],"critical":[8,116],"challenge":[9],"in":[10],"modern":[11],"democracies.":[12],"This":[13,108],"paper":[14],"proposes":[15],"novel":[17],"blockchain-based":[18,88],"e-voting":[19,89,113],"system":[20,44,65,72,92],"that":[21,70],"enhances":[22],"privacy":[23,76,117],"transparency":[25],"by":[26,114],"integrating":[27,137],"advanced":[28],"cryptographic":[29,100],"techniques.":[30],"Utilizing":[31],"dual-encryption":[33],"approach":[34,59],"with":[35,82],"Advanced":[36],"Encryption":[37],"Standard":[38],"(AES)":[39],"Rivest-Shamir-Adleman":[41],"(RSA),":[42],"the":[43,71,91],"anonymizes":[45],"voter":[46,61,75,142],"choices":[47],"prevents":[49],"unauthorized":[50],"access":[51],"to":[52,86,111,140],"voting":[53,124],"data.":[54],"Unlike":[55],"existing":[56],"models,":[57,90],"our":[58],"ensures":[60],"anonymity":[62],"even":[63],"from":[64],"administrators.":[66],"Experimental":[67],"results":[68],"demonstrate":[69],"effectively":[73],"preserves":[74],"while":[77],"maintaining":[78],"efficient":[79],"transaction":[80],"processing":[81,104],"minimal":[83],"overhead.":[84],"Compared":[85],"previous":[87],"achieves":[93],"superior":[94],"security":[95],"performance":[97],"through":[98],"optimized":[99],"techniques":[101],"parallel":[103],"using":[105],"Hyperledger":[106],"Fabric.":[107],"study":[109],"contributes":[110],"secure":[112],"addressing":[115],"concerns":[118],"demonstrating":[120],"scalable,":[122],"blockchain-enabled":[123],"framework.":[125],"Future":[126],"research":[127],"will":[128],"focus":[129],"on":[130],"optimizing":[131],"scalability":[132],"for":[133],"large-scale":[134],"emerging":[138],"technologies":[139],"enhance":[141],"authentication":[143],"accessibility.":[145]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-02-10T00:00:00"}
