Fakultas Sains Informatika Jurusan Informatika Universitas Jenderal Ahmad Yani Jl. Terusan Jend. Sudirman, Cimahi, Jawa Barat, Kota Cimahi, Jawa Barat 40525, Indonesia
BibTex Citation Data :
@article{JMASIF66317, author = {Muhammad Soleh}, title = {Kriptografi Homomorfik dalam Anonimisasi Data untuk Pengolahan Data pada Sistem E-Voting}, journal = {Jurnal Masyarakat Informatika}, volume = {15}, number = {2}, year = {2024}, keywords = {Cryptography, homomorphic, pailier, encryption, decryption, e-voting}, abstract = { In today's age of technological advancement, protecting data security and privacy is a significant challenge. This study seeks to prove the effectiveness of Homomorphic Cryptography techniques, which allow data to be processed while remaining encrypted, addressing the limitations of standard encryption methods that only secure data but do not enable processing of encrypted information. The research approach involves analyzing Homomorphic Cryptography by designing an e-voting system that utilizes the Paillier algorithm, enabling the processing of vote data while it is encrypted, along with generating keys for encrypting and decrypting the votes. The results of this study indicate that implementing Homomorphic Cryptography within a web-based e-voting platform successfully facilitates data processing in an encrypted state. Additionally, security testing via a Ciphertext-only attack did not reveal any plaintext information, while performance testing recorded an encryption-decryption time of 0.010 seconds. Shannon entropy analysis also yielded a result of 3.20 bits for a single encrypted vote. }, issn = {2777-0648}, pages = {107--124} doi = {10.14710/jmasif.15.2.66317}, url = {https://ejournal.undip.ac.id/index.php/jmasif/article/view/66317} }
Refworks Citation Data :
In today's age of technological advancement, protecting data security and privacy is a significant challenge. This study seeks to prove the effectiveness of Homomorphic Cryptography techniques, which allow data to be processed while remaining encrypted, addressing the limitations of standard encryption methods that only secure data but do not enable processing of encrypted information. The research approach involves analyzing Homomorphic Cryptography by designing an e-voting system that utilizes the Paillier algorithm, enabling the processing of vote data while it is encrypted, along with generating keys for encrypting and decrypting the votes. The results of this study indicate that implementing Homomorphic Cryptography within a web-based e-voting platform successfully facilitates data processing in an encrypted state. Additionally, security testing via a Ciphertext-only attack did not reveal any plaintext information, while performance testing recorded an encryption-decryption time of 0.010 seconds. Shannon entropy analysis also yielded a result of 3.20 bits for a single encrypted vote.
Article Metrics:
Last update:
Last update: 2026-02-02 22:27:52
The authors who submit the manuscript must understand that the article's copyright belongs to the author(s) if accepted for publication. However, the author(s) grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors should also understand that their article (and any additional files, including data sets, and analysis/computation data) will become publicly available once published under that license. By submitting the manuscript to Jmasif, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. Jmasif will not be held responsible for anything arising because of the writer's internal dispute. Jmasif will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. Jmasif allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and Jmasif to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.