期刊文献+

一个有效的电子选举方案 被引量:3

原文传递
导出
摘要 本文分析了当前电子选举方案中存在的缺陷,提出了一个基于公钥密码体制的有效的电子选举方案,并对其安全性进行了分析。该方案采用盲签名和可验证的投票编号以及认证码等技术,简化了投票过程,具有较好的安全性和实用性。
作者 冯泽涛 张勇
出处 《计算机与信息技术》 2007年第5期24-26,29,共4页 Computer & Information Technology
  • 相关文献

参考文献1

二级参考文献5

  • 1[1]Cramer R, Gennaro R, Schoenmakers B. A Secure and Optimally Eifficient Multi-authority Election Scheme.In European Transactions on Telecommunications ,1997, 8(5):481-490
  • 2[2]Radwin M J. An Untraceable, Universally Verifiable Voting Scheme. Seminar in Cryptology Professor Philip Klein, 1995-12
  • 3[3]A Verifiable Multi-authroties Secret Election Allowing Abstaining from Voting. 1998
  • 4[4]Hevia A, Kivi M. Electronic Jury Voting Protocols. http:// cite- seer.nj. nec.com/hevia01electronic.html, 2001
  • 5[6]Cramer R. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Advances in Cryptology-CRYPTO94, Springer-Verlag. 1994

共引文献8

同被引文献17

  • 1刘景美,傅晓彤,程相国,王新梅.电子投票的安全性及应用前景[J].计算机安全,2004(12):24-26. 被引量:4
  • 2卢鹏菲,詹雄泉,洪景新.基于椭圆曲线的有序多重数字签名方案[J].厦门大学学报(自然科学版),2005,44(3):341-343. 被引量:9
  • 3Chaum D. Untraceable electronic mail return addresses and digital pseudonyms [J]. Communications ofACM, 1981, 24(2):84-88.
  • 4C.Park, K.itoh and K.Kurosawa. Efficient anonymous channel and all/ nothing election scheme[C]. In Proc. of Eurocrypt: 1993, 248-259.
  • 5Shaobin Wang, Hong Fan, Guohua Cui. A Proxy Blind Signature Schemes Based DLP and Applying in e-Voting[J].ICEC, 2005:641-645.
  • 6Shugong Wang, Guilin Wang, Feng Bao, Jie Wang. Cryptanalysis of A proxy-protected Proxy Signature Scheme Based on Elliptic Curve cryptosystem [J].0-7803-8521-7/04IEEE, 2004.
  • 7Changjie Wang, Ho-fung Leung. A Secure Voter-Resolved Approval Voting Protocol over Internet [J] .ICEC, 2005:646-652.
  • 8D.C.Parkes, M.O.Rabin, S.M.Shieber,C.A.Thorpe.Verifiably Correct and Trustworthy Auctions[J].ICEC, 2006,(09) : 14-16.
  • 9Zvika Brakerski and Vinod Vaikuntanathan. Efficient fully homomerphic encryption from (standard) lwe [J].In FOCS,2011.
  • 10Oded Regev. On lattices, learning with errors, random linear codes, and cryptography[J]. STOC, 2005:84-93.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部