期刊文献+

基于多方排序协议的安全电子投票方案 被引量:11

Secure Electronic Voting Scheme Based on Multi-party Ranking
下载PDF
导出
摘要 与传统投票相比较,电子投票拥有许多优势,也存在重要的安全问题.电子投票的全隐私性是评估投票方案安全的重要指标,它是指对投票者的隐私保护和候选者的隐私保护,特别是落选者的得票数的保护.利用可验证秘密共享的思想提出了一个安全多方排序协议,并将它运用到电子投票中,设计了一个新的安全的电子投票协议,本协议具有全隐私性. Compared with the traditional voting, electronic voting(e-voting) not only has many advantages, but also exists many security problems. The full privacy of electronic voting is an important index to evaluate the security of the voting scheme, it implies the privacy of the voters and candidates for privacy protection, especially the protection of total votes for the losers. This paper designs a secure multi-party ranking protocol via using the verifiable secret sharing. We propose a new secure electronic voting scheme based on the proposed multi-party ranking protocol. The e-voting scheme is full privacy.
出处 《计算机系统应用》 2015年第8期25-32,共8页 Computer Systems & Applications
基金 国家自然科学基金(61103247 61363069) 广西自然科学基金(2014GXNSFAA118364)
关键词 电子投票 多方排序 可验证秘密共享 全隐私 electronic voting multi-party ranking verifiable secret sharing full privacy
  • 相关文献

参考文献18

  • 1Brace KW. Nation Sees Drop in Use of Electronic Voting Equipment for 2008 Election-A First. Manassas, VA: Election Data Services Inc.
  • 2Chaum D. Untraceable electronic mail, return addresses and digital pseudonyms. Communications of ACM, 198/,, 24(2): 84-88.
  • 3Fujioka A, Okamoto T, Ohm K. A practical secret voting scheme for large scale elections. In: Seberry J, ed. Advances in Cryptolog(AUSCRYPT'92). Berlin, Heidelberg. Springer Berlin Heidelberg. LNCS718. 1992. 244-251.
  • 4Cramer R, Gennaro R, Schoenmakers B. A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications. Hoboken. John Wiley & Sons. Ltd. 1997. 8(5): 481-490.
  • 5Damgard I, Jurik M. A generalisation, as simplication and some applications of Paillier's probabilistic public-key system. In: Kim K, ed. Public Key Cryptography. Berlin, Heidelberg. Springer Berlin Heidelberg. LNCS1992. 2001. 119-136.
  • 6仲红,黄刘生,罗永龙.基于安全多方求和的多候选人电子选举方案[J].计算机研究与发展,2006,43(8):1405-1410. 被引量:39
  • 7Yi X, Okamoto E. Practical interact voting system. Journal of Network and Computer Applications, 2013, 36(1): 378-387.
  • 8Rui J, Pauto F, Carlos R. EVIV: An end-to-end verifiable intemet voting system. Computers and Security, 2013, 32(2): 170-191.
  • 9Rabin MO, Rivest LR. Practical end-to-end verifiable voting via split-value representations and randomized partial checking. CalTech/MIT Voting Technology Project Working. 2014. 122.
  • 10Benaloh J, Tuinstra D. Receipt-free secret-ballot elections, Proc. of the 26th ACM Symposium on Theory of Computing. New York. ACM. 1994. 544-553.

二级参考文献37

  • 1YAO A C.Protocot for secure computations [C]//Proceedings of 23^rd IEEE Symposium on Foundations of Computer Science.Los Alamitos,USA:IEEE Computer Society Press,1982:160-164.
  • 2GOLDWASSER S.Muhi-party computations:past and present[C]//Proceedings of the 16^th Annual ACM Symposium on Principles of Distributed Computing.New York:ACM Press,1997:21-24.
  • 3王全来,王亚弟,韩继红.密码协议形式化分析的计算合理性[J].微计算机信息,2007(24):50-52. 被引量:1
  • 4J Benaloh, D Tuinstra. Receipt-free secret-ballot elections [C].In: Proc of the 26th ACM Symposium on Theory of Computing. New York: ACM Press, 1994. 544-553
  • 5J Groth. Efficient maximal privacy in boardroom voting and anonymous broadcast [G]. In: Proc of the 8th Int'l Conf on Financial Cryptography ( FC2004 ), LNCS 3110. Berlin:Springer-Verlag, 2004. 90-104
  • 6R Cramer, M Franklin, B Schoenmakers, et al. Multauthority secret-ballot elections with linear work [G]. In: Advances in Cryptology-Eurocrypt' 96, LNCS 1070. Berlin: Springer-Verlag, 1996. 72-83
  • 7R Cramer, R Gennaro, B Schoenmakers. A secure and optimally efficient multi-authority election scheme [G]. In:Advances in Cryptology-Eurocrypt' 97, LNCS 1223. Berlin:Springer-Verlag, 1997. 103-118
  • 8I Damgard, M Jurik. A generalisation, a simplication and some applications of Paillier' s probabilistic public-key system [G].In: The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001 ), LNCS 1992. Berlin:Springer-Verlag, 2001. 119-136
  • 9O Goldreich. Secure multi-party computation (working draft)[OL]. http://www. wisdom. weizmann. ac. il/home/oded/publichtml/foc. html, 1998
  • 10K H Rosen. Elementary Number Theory and Its Applications[M]. New York: Addition Wesley, 1984

共引文献59

同被引文献45

引证文献11

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部