期刊文献+

基于安全多方求和的多候选人电子选举方案 被引量:39

A Multi-Candidate Electronic Voting Scheme Based on Secure Sum Protocol
下载PDF
导出
摘要 多候选人电子选举方案在许多实际环境下具有重要的应用价值,但现有绝大多数方案由于技术限制只能进行“两选一”投票·设计了一种新型的选票结构,在一个多精度数中隐藏“m选k”形式的选票,对m个候选人至多可以投k个赞成票;将多精度计算及安全多方求和协议应用于投票和计票,选举过程中不需要可信任第3方,任何投票人都可以计票·与一般方案相比,该方案具有更强的安全性,包括选票的完全保密性和无收据性、计票的公平性和无争议性、系统的健壮性等;无需使用传统的加密技术·对n个投票人,计算的位复杂性为O(nm(log2n)),其效率优于现有方案且容易实现· Multi-candidate electronic voting is very useful in numerous practical situations. Most of the previous schemes discuss Boolean vote in which voters can only cast "yes/no" vote. A novel multi-candidates election scheme is presented which is appropriate for k-out-of-m election. The main idea is to express a ballot by a multi-precision number that allows voting for up to k out of the m candidates in one ballot. The purpose of the vote is to elect more than one winner among m candidates. The self-tallying protocol in the solution is based on the multi-precision arithmetic and the secure sum protocol without any trusted third party. In comparison with general methods, the results of this paper don't rely on any traditional cryptography or computation intractability assumption that is information-theoretically secure. This scheme achieves security including perfect ballot secrecy, receipt-free and dispute-freeness tally that extend the previous general security. Each participant takes only O ( nm (log2 n )) bit operations, which is more efficient than previous schemes. The scheme is very practical and can be efficiently implemented.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第8期1405-1410,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60573171) 国家"九七三"重点基础研究发展规划基金项目(2003CB317000) 安徽省教育厅自然科学基金项目(2003KJ010) 安徽高校省级自然科学研究重点基金项目(2006KJ024A)~~
关键词 电子选举 安全求和 多精度运算 electronic voting secure sum multi-precision arithmetic
  • 相关文献

参考文献13

  • 1J Benaloh, D Tuinstra. Receipt-free secret-ballot elections [C].In: Proc of the 26th ACM Symposium on Theory of Computing. New York: ACM Press, 1994. 544-553
  • 2J Groth. Efficient maximal privacy in boardroom voting and anonymous broadcast [G]. In: Proc of the 8th Int'l Conf on Financial Cryptography ( FC2004 ), LNCS 3110. Berlin:Springer-Verlag, 2004. 90-104
  • 3R Cramer, M Franklin, B Schoenmakers, et al. Multauthority secret-ballot elections with linear work [G]. In: Advances in Cryptology-Eurocrypt' 96, LNCS 1070. Berlin: Springer-Verlag, 1996. 72-83
  • 4R Cramer, R Gennaro, B Schoenmakers. A secure and optimally efficient multi-authority election scheme [G]. In:Advances in Cryptology-Eurocrypt' 97, LNCS 1223. Berlin:Springer-Verlag, 1997. 103-118
  • 5I Damgard, M Jurik. A generalisation, a simplication and some applications of Paillier' s probabilistic public-key system [G].In: The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001 ), LNCS 1992. Berlin:Springer-Verlag, 2001. 119-136
  • 6O Goldreich. Secure multi-party computation (working draft)[OL]. http://www. wisdom. weizmann. ac. il/home/oded/publichtml/foc. html, 1998
  • 7K H Rosen. Elementary Number Theory and Its Applications[M]. New York: Addition Wesley, 1984
  • 8H Cohen. A Course in Computational Algebraic Number Theory[M]. Berlin: Springer, 1993
  • 9D E Knuth. The Art of Computer Programming: Semi-Numerical Algorithms [M]. Volume 2. New York: Addition Wesley, 1981
  • 10J C Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret [G]. In: Advances in Cryptology-Crypto' 86,LNCS 263. Berlin: Springer-Verlag, 1986. 251-260

同被引文献208

引证文献39

二级引证文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部