期刊文献+

电子选举中的安全协议(英文) 被引量:3

Cryptographic Protocols for Electronic Voting
下载PDF
导出
摘要 随着因特网上出现的一些小范围的电子选举,电子选举开始引起人们的关注.而电子选举中的关键技术之一是电子选举协议的设计,特别是在多种投票方式下大规模电子选举协议的安全性问题.讨论了优秀的电子投票系统应该具备的特点,及如何通过密码协议来实现这些特点;对电子选举协议提出了新的分类方法,并考察了其优缺点;并对已有的许多电子选举协议进行了分类整理,有助于人们更好地理解这一领域内所面临的挑战和问题;同时对电子选举系统的设计也给出了一些建议. Electronic Voting has begun to move into the mainstream, with small online votes taking place on the Internet. Electronic Voting investigates how to conduct large-scale electronic Voting securely including various modes of voting. In this paper we will discuss the characteristics of a good Electronic Voting system and explore cryptographic Protocols that can be used to build actual implementations with these characteristics. We mainly study the Electronic Voting protocols as opposed to the Electronic Voting systems. We propose some new taxonomy of the security protocols proposed for Electronic Voting procedures and examine their advantages and shortcomings. The goal of the paper is to impose some order into the multitude of Electronic Voting mechanisms that would lead to a better understanding of challenges in the Electronic Voting field. In the end, we give some advices on Electronic Voting system design.
出处 《中国科学院研究生院学报》 CAS CSCD 2002年第3期295-305,共11页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 973 Project(G1999035802) National Natural Science Foundation of China (60025205)
关键词 电子选举 安全协议 密码学 电子投票系统 网络安全 密码协议 Electronic Voting, cryptology, protocols
  • 相关文献

参考文献23

  • 1[1]J Cohen, M Fischer.A Robust and Verifiable Cryptographically Secure Election Scheme. In: Proceedings of the 26th IEEE Symposium of Computer Science.1985
  • 2[2]S Chien, C Shan. Hierarchical Distributed Election Protocols;www.digitas.harcard.edu/ kem/cs262/
  • 3[3]Davenport B, Newberger A, Woodard J. Creating a Secure Digital Voting Protocol for Campus Elections. Unpublished paper. 1995; Available online from http://www.princeton.edu/~bpd/voting/
  • 4[4]Benaloh J,Tuinstra D. Receipt=Free Secret-ballot Elections. In: Proceedings of the Twenty-sixth Annual ACM Symposium on the Theory of Computing.1994
  • 5[5]Valtteri Niemi, Ari Renvall. How to Prevent Buying of Votes in Computer Elections. Advances in Cryptology--ASIACRYPT '94
  • 6[6]CyberVote. Report on Review of Cryptographic Protocols and Security techniques for Electronic Voting,2002
  • 7[7]VoteHere Inc. Network Voting System Standards.2002
  • 8[8]Salomaa A. Verifying and Recasting Secret Ballots in Computer Networks. In: New Results and New Trends in Computer Science.Berlin: Springer-Verlag, 1991
  • 9[9]Chaum D. Blind Signatures for Untraceable Payments. In: Proceedings of Crypto 82, New York:Plenum Press.1983
  • 10[10]Cranor L F,Cytron R K. Design and Implementation of a Security-Conscious Electronic Polling System. Washington University Computer Science Technical Report WUCS-96-02.1996

同被引文献26

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部