期刊文献+

基于SM9盲签名与环签名的安全电子选举协议 被引量:2

Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature
下载PDF
导出
摘要 针对电子选举过程中匿名性、公开可验证性、选票碰撞及伪造等问题,提出基于SM9算法的匿名公开可验证电子选举系统协议设计方案。以SM9签名算法为基础,构造基于身份的SM9盲签名算法和可链接环签名算法。算法安全分析表明,在随机预言机模型下,盲签名算法具有盲性和不可伪造性,环签名算法具有不可伪造性、匿名性、可链接性。在计算开销方面,盲签名算法在密钥提取阶段只需要1次标量乘、1次模逆和1次模乘运算,单次消耗的时间约为0.8717 ms,环签名算法在密钥提取、环签名生成、环签名验证阶段均具有较高的效率,整个环签名过程只需要5次双线性对运算,单次消耗的时间约为27.2617 ms。在通信开销方面,盲签名和环签名的签名长度均优于对比方案。电子选举协议的安全分析表明,所提方案满足电子选举系统的安全要求,与同类方案相比具有公开可验证、无收据性等优点,适合应用于大规模选举。 To solve the problems of anonymity,public verifiability,ballot collision,and forgery in the process of e-voting,an anonymous public verifiable e-voting system protocol design scheme is proposed based on SM9 algorithm.This scheme constructs an identity-based SM9 blind signature algorithm and linkable ring signature algorithm based on SM9 cryptographic algorithm.Algorithm security analysis shows that,under the random oracle model,the blind signature algorithm is blind and unforgeable,and the ring signature algorithm is unforgeable,anonymous,and linkable.In terms of computational overhead,the blind signature algorithm has certain advantages in the key extraction stage.It only requires one scalar multiplication operation,one modular inverse operation,and one modular multiplication operation,and the time consumed is only approximately 0.8717 ms.The ring signature algorithm has higher efficiency in each stage of key extraction,ring signature generation,and ring signature verification,and the time consumed is only approximately 27.2617 ms.In terms of communication overhead,the signature lengths of both blind signature and ring signature are better than those of the comparison schemes.Security analysis of the e-voting protocol shows that the proposed scheme meets the security requirements of the e-voting system.Compared with similar schemes,it has the advantages of open verifiability and no receipt,and is suitable for large-scale elections.
作者 饶金涛 崔喆 RAO Jintao;CUI Zhe(Chengdu Institute of Computer Application,Chinese Academy of Sciences,Chengdu 610081,China;University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《计算机工程》 CAS CSCD 北大核心 2023年第6期13-23,33,共12页 Computer Engineering
基金 四川省科技成果转移转化示范项目(2022ZHCG0007)。
关键词 SM9密码算法 盲签名 环签名 不可伪造性 匿名性 可链接性 电子选举 SM9 cryptographic algorithm blind signature ring signature unforgeability anonymoity linkability e-voting
  • 相关文献

参考文献4

二级参考文献30

  • 1谢金宝,刘晖波.电子选举系统的基本框架与信息流程[J].计算机工程,2000,26(S1):97-102. 被引量:8
  • 2夏静波,张四兰,陈建华.一个无收据的高效电子选举方案[J].武汉大学学报(理学版),2006,52(3):340-344. 被引量:3
  • 3Chaum D. Untraceable electronic mail, return addresses, and digi- tal pseudonyms[J]. Communications o the ACM, 1981,24(2) .. 84-88.
  • 4Cohen J, Fisher M. A robust and verifiable eryptographically se- curity election scheme[C]//Proceedings of the 26th ACM Sym- posium on Foundations of Computer Science. 1985:372-382.
  • 5Benaloh J, Tuinstra D. Receipt-free secret-ballot elections (ex- tended abstract)[C]//Proceedings of the 26th ACM Sympo- sium on Theory of Computing. 1994 : 544-553.
  • 6Iversen K R. A cryptographic scheme for computerized general elections[M]///Advances in Cryptology-CRYPTO' 91. Spinger, 1992:405-419.
  • 7Sako K,Kilian J. Secure voting using patially compatiable homo- morphisms[M]//Advances in Cryptology-CRYPTO' 94. Spring- er, 1994:405-419.
  • 8Essex A, Hengartner U. Hover: Trustworthy elections with hash-only verification[J]. IEEE Security 8 Privacy, 2012, 10 (5) : 18-24.
  • 9Chen X, Wu Q, Zhang F, New receipt-free voting scheme using double-trapdoor commitment [J]. Information Sciences, 2011,181(8):1493-1502.
  • 10Rui J, Paulo F, Carlos R. EVIV: An end-to-end verifiable inter- net voting system[J]. Computers Security, 2013,32 (2) : 170- 191.

共引文献85

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部