期刊文献+

基于ThreeBallot的投票协议优化方案 被引量:1

Improved voting scheme based on ThreeBallot voting scheme
下载PDF
导出
摘要 为了适应电子选举的多种投票场景,针对选民隐私与选票公开可验证之间的矛盾,提出了基于ThreeBallot投票方案的改进方案。该方案首先针对ThreeBallot方案原本的一些问题进行了优化,比如ThreeBallot投票方案在攻击者收集了足够多的票据后,有较大概率可以重构出投票人的选票信息,从而破坏方案的匿名性,改进后的方案优化了票据的生成过程,引入了假选票承诺机制,切断了票据与投票者之间的联系,使得针对该投票方案的选票重构攻击不再奏效。其次优化后的方案可以更容易地进行公告板的管理与展示,使得投票过程更加清晰直观。改进后的方案利用更加巧妙的设计,使得投票者可以在不泄露自身隐私的情况下,验证自己的选票被系统正确地公开记录。从模拟投票的实验中也可以清楚得看到,与ThreeBallot方案相比,改进后的方案在计票环节工作量与原方案在同一数量级,但是具有更好的安全性,所有尝试通过收据对原始选票的重构攻击均不成功。该方案可以作为新一代投票系统的设计依据,让投票系统在不泄露投票者隐私的情况下,可以全网公开投票结果,使投票结果更令人信服。 To adapt a voting system to more situations,and coordinate the contradiction between privacy and public verifiability,an optimized voting scheme based on ThreeBallot was proposed.Firstly,the drawback of ThreeBallot voting scheme was solved by the optimized scheme.For example,when an attacker collects enough vote receipts,he can reconstruct the ballot via the information in the receipts,thus the privacy is infringed.The voting ticket generation process was optimized,with the help of dummy vote,the connection between the vote and the voter was cut off,so that the reconstruction attack on the voting scheme no longer worked.By using the optimized scheme,it is easier to manage the bulletin board,and the voting process is more clear and intuitive.The optimized scheme let the voter can verify whether his/her vote was correctly recorded without leaking the privacy.From the experiment of vote process,it is clear that,compared to the ThreeBallot scheme,the optimized scheme had the same level of difficulty in counting vote,and provided a higher level of security,all the attempts of reconstruction attack failed.This solution can serve as the basis for a new generation of voting system to release vote to the Internet bulletin for verification without leaking voter’s privacy.
作者 江欣蔚 王晓京 JIANG Xinwei;WANG Xiaojing(Chengdu Institute of Computer Application,Chinese Academy of Sciences,Chengdu Sichuan 610041,China;University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《计算机应用》 CSCD 北大核心 2018年第A02期178-182,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61501064) 四川省科技厅支撑计划项目(2015GZ0088)
关键词 电子选举 投票协议 抵近物理投票 匿名性 公开可验证 electronic election voting protocol poll-site based voting anonymity open verifiability
  • 相关文献

参考文献3

二级参考文献18

  • 1谢金宝,刘晖波.电子选举系统的基本框架与信息流程[J].计算机工程,2000,26(S1):97-102. 被引量:8
  • 2陈娟,袁丁.数字签名算法在电子选举系统中的应用[J].中国测试技术,2006,32(4):109-112. 被引量:1
  • 3王思佳,韩玮,陈克非.电子选举研究的挑战和进展[J].计算机工程,2006,32(15):7-9. 被引量:15
  • 4Kiayias A,Yung M.The Vector-ballot E-voting Approach[C].Proc.of Financial Cryptography,2004:72.
  • 5Ishida N,Matsuo S,Ogata W.Divisible Voting Scheme[C].Proc.of the 6^th Information Security Conference,2004:137.
  • 6Chaum D.Secret-ballot Receipts:True Voter-verifiable Elections[J].IEEE Security & Privacy,2004,2(1):38.
  • 7Kiayias A,Yung M.Self-tallying Elections and Perfect Ballot Secrecy[C].Proceedings of International Workshop on Practice and Theory in Public-key Cryptography,2002:141.
  • 8Chanm D. Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms[ J]. Communication of the ACM, 1981, 24 (2) :84 - 85.
  • 9Chaum D. Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA [ J]. In Advances in Cryptology Eurocrypty 88 of Lecture Notes in Computer Science, 1988, 330:177 - 179.
  • 10Benaloh J, Tuinstra D. Receipt-free Secret Ballot Elections [ C]//In Proceedings of the 26th ACM Symposium on Theory of Compu- ting (STOC'94). [S. 1. ] :ACM Press, 1994:544 -553.

共引文献18

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部