期刊文献+

一种基于可信计算技术的电子投票方案 被引量:1

Electronic Voting Scheme Based on Trusted Computing Technology
下载PDF
导出
摘要 在现有的电子投票方案中,要求满足以下前提:投票人所使用的客户端是安全的,投票人与管理者之间存在匿名的或秘密的通信信道,但这2点通常难以成立。为此,提出一种基于可信计算技术的电子投票方案,该方案利用可信计算技术保障客户端安全性,减少匿名信道或秘密信道的使用,提高电子选举的实用性,并且满足投票系统机密性、无收据性、公开可校验性等安全属性。分析结果表明,与同类方案相比,该方案的通信量较低,投票效率较好。 In current electronic voting schemes, there are the following preconditions that must be met, the clients that using by voters are secure, and the anonymous or secret communication channels are existent between the voters and administers. Therefore, a new scheme based on trusted computing technology is proposed, which can protect the clients, decrease the use of anonymous or secret communication channels, promote the practicability of the electronic voting system, meet the demands of security attributes such as confidentiality, receipt-free, open verification, etc. Analysis result shows that compared with similar schemes, this scheme has lower communication traffic and better voting efficiency.
作者 冯聿梦
出处 《计算机工程》 CAS CSCD 2012年第6期1-6,共6页 Computer Engineering
基金 国家"973"计划基金资助项目(2007CB311100) "核高基"重大专项(2010ZX01037-001-001)
关键词 电子投票 可信计算 同态加密 机密性 无收据性 秘密信道 electronic voting trusted computing homomorphic encryption confidentiality receipt-free secret channel
  • 相关文献

参考文献19

  • 1Chevallier-Mames B, Fouque P A, Stern D P J, et al. On Some Incompatible Properties of Voting Schemes[C]//Proc. of Towards Trustworthy Elections: New Directions in Electronic Voting Conference. [S. 1.]: Springer, 2010.
  • 2Fink R A, Sherman A T, Carback R. TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4): 628-637.
  • 3Gallo R, Kawakami H, Dahab R, et al. T-DRE: A Hardware Trusted Computing Base for Direct Recording Electronic Vote Machines[C]//Proc. of the 26th Annual Computer Security Applications Conference. [S. 1.]: ACM Press, 2010.
  • 4沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:251
  • 5Alkassar A, Sadeghi A R, Schulz S, et al. Towards Trustworthy Online Voting[C]//Proc. of the 1st Benelux Workshop on Information and System Security. [S. 1.]: IEEE Press, 2006.
  • 6Paul N, Tanenbaum A S. Trustworthy Voting: From Machine to System[J]. IEEE Computer, 2009, 42(5): 23-29.
  • 7Smart M, Ritter E. True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing[R]. Birmingham, UK: University of Birmingham, Tech. Rep.: CSR - 10-12, 2010.
  • 8Trusted Computing Group. TPM Main Specification[EB/OL]. (2007-10-20). http://www.trustedcomputinggroup.org/resources/tp m_main_specification.
  • 9Clarkson M R, Chong S, Myers A C. Civitas: Toward a Secure Voting System[C]//Proc. of the 29th IEEE Symposium on Security and Privacy. [S. 1 .]: IEEE Press, 2008.
  • 10Dingledine R, Mathewson N, Syverson P. Tor: The Second- generation Onion Router[C]//Proc. of the 13th USENIX Security Symposium. [S. 1 .]: USENIX Association, 2004.

二级参考文献109

共引文献256

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部