期刊文献+

基于同态实现多候选人的电子投票方案 被引量:5

AN ELECTRONIC VOTING SCHEME REALIZING MULTI CANDIDATES BASED ON HOMOMORPHISM
下载PDF
导出
摘要 选举是当今公民实现民主的重要方式,相比于传统选举方式,电子选举以密码学为基础,可以有效避免在各个环节中出现徇私舞弊现象,并且在计票阶段也比传统选举方式更快、更准确。在满足电子选举的公正性、唯一性、匿名性等八个基本特性的基础上,该方案通过使用Paillier加密的加法同态性来避免在计票环节对选民选票进行舞弊操作,同时能够大幅度提高电子选举在最后计票环节的效率。 Election is an important way to achieve democratic citizenship in modern society. Compared with the traditional approach, electronic voting election can effectively avoid the phenomenon of favoritism in each section based on cryptography, and it is much faster and more accurate in vote counting. On the basis of satisfying the eight properties of fairness, uniqueness, anonymity and so on, the proposed scheme applied the addition homomorphism encrypted by Paillier in order to avoid the fraud operation on electors votes in vote counting. Meanwhile, it is able to greatly enhance the efficiency of electronic voting in the last vote counting section.
作者 黄仕杰 洪璇 Huang Shijie Hong Xuan(College of Information, Mechanical and Electrical Engineering, Shanghai Normal University, Shanghai 200234, Chin)
出处 《计算机应用与软件》 2017年第3期284-288,共5页 Computer Applications and Software
基金 上海市自然科学基金项目(14ZR1431000)
关键词 电子选举 同态加密 Paillier公钥密码体制 RSA公钥密码体制 加法同态性 Electronic vote Homomorphic encryption Paillier public key cryptography RSA public key cryptography Addition homomorphism
  • 相关文献

参考文献7

二级参考文献40

  • 1苏云学,逯海军,祝跃飞.一个无需中央机构的电子投票协议[J].计算机工程,2004,30(11):96-97. 被引量:9
  • 2明洋,王尚平,王晓峰.强(t,N)密钥隔离下的盲签名方案[J].计算机工程,2005,31(16):54-56. 被引量:1
  • 3王思佳,韩玮,陈克非.电子选举研究的挑战和进展[J].计算机工程,2006,32(15):7-9. 被引量:15
  • 4Goldwasser S, Micali S, Rackoff C. The knowledge complex- ity of interactive proof systems [ C ]//Proceedings of the 17th Annual ACM Symposium on Theory of Computing. Philadelphia, PA, USA:Society for Industrial and Applied Mathematices, 1985:291-304.
  • 5Goldreich O, Micali S, Wigderson A. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems [ J ]. J. ACM, 1991,38 (3) :691-729.
  • 6Feige U, Fiat A, Shamir A. Zero knowledge proofs of identity [ J ]. Journal of Cryptology, 1988,1 ( 2 ) : 77-94.
  • 7Koblitz Neal. A Course in Number Theory and Cryptography [ M ]. Springer, 1994.
  • 8Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [ J ]. Communications of the ACM, 1978,21 (2) : 120-126.
  • 9Oded Goldreich. Foundations of Corptogmphy: Volume 1, Basic Tools ( Voll ) [ M ]. Cambridge Unirersity Press,2001.
  • 10Bruce Schneier. Applied Cryptography( 2nd Edition ) [ M ]. Wiley, 1995.

共引文献28

同被引文献20

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部