期刊文献+

基于同态加密策略的电子选举系统 被引量:3

Electronic voting systems based on homomorphic encryption scheme
下载PDF
导出
摘要 针对电子选举系统的安全性问题,提出了一种基于同态加密策略保护选民隐私的高安全性的电子选举系统设计方案。该系统采用同态加密策略进行选民的投票结果运算,采用非对称密码算法保证数据信息传输过程中的数据安全,保护选民的身份和意愿不被暴露。 An evoting system with high security based on homomorphic encryption for protecting the privacy of voters was proposed. The proposed system employed homomorphic encryption scheme for the calculation of voting and asymmetric cryptography to ensure the data security during transmission for protecting the identity and the will of voters from being exposed.
作者 李蓓
出处 《计算机应用》 CSCD 北大核心 2015年第A01期66-68,88,共4页 journal of Computer Applications
关键词 电子选举系统 同态加密 非对称密码体制 RSA electronic voting system homomorphic encryption symmetric cryptography RSA
  • 相关文献

参考文献12

  • 1MOAYED M J, GHANI A A A, MAHMOD R. A survey on cryptog- raphy algorithms in security of voting system approaches [ C]//Pro- ceedings of the 2008 International Conference on Computational Sci- ences and Its Applications. Piscataway: IEEE, 2008:190 -200.
  • 2ONDRISEK B. E-voting system security optimization [ C]// Pro- ceedings of the 42nd Hawaii International Conference on System Sci- ences. Piseataway: IEEE, 2009:1-8.
  • 3IFTENE S. General secret sharing based on the Chinese remainder theorem with applications in e-voting [ J]. Electronic Notes in Theo- retical Computer Science, 2007, 186:67-84.
  • 4BENALOH J. Secret sharing homomorphisms: keeping shares of a secret secret [ C]// Advances in Cryptology -- CRYPTO' 86, LNCS 263. Berlin: Springer, 1987:251-260.
  • 5徐广芝,叶震.秘密计票的多候选人电子投票方案[J].合肥工业大学学报(自然科学版),2008,31(9):1462-1464. 被引量:3
  • 6郭栋梁,秦静,李鹏程.一个基于OT协议的电子选举方案[J].计算机应用,2008,28(5):1335-1337. 被引量:3
  • 7郑燕飞,陈克非.电子选举:理论、实践与未来[J].计算机科学,2002,29(4):12-14. 被引量:4
  • 8王思佳,韩玮,陈克非.电子选举研究的挑战和进展[J].计算机工程,2006,32(15):7-9. 被引量:15
  • 9GRITZALIS D. Secure electronic voting[ C]// Advances in Infor- mation Security 7. Dordrecht: Kluwer Academic Publishers, 2003.
  • 10SANTIN A O, COSTA R G, MAZIERO C A. A three-ballot-based secure electronic voting system[ J]. IEEE Security and Privacy, 2008, 6(3) : 14 - 21.

二级参考文献36

共引文献20

同被引文献25

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部