Advertisement

A Design of Practical Electronic Voting Protocol

  • ShiJie Guan
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 149)

Abstract

voting behavior in modern democratic society is a frequently occurring behaviors, electronic voting is always used. However there are some defects in existed electronic voting protocols. This paper is aim to introduce a few basic properties that the secure electronic voting protocol should have, then design a based on public key (double key),blind signature and ensure the password technology to realize the electronic voting protocol, the protocol has high security ,it is very suitable for large-scale election system.

Keywords

cryptography electronic voting blind signature bit assurance 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM (24), 84–88 (1981)CrossRefGoogle Scholar
  2. 2.
    Demillo, R., Merritt, M.: Protocols for Data Security. Computer 02, 39 (1983)CrossRefGoogle Scholar
  3. 3.
    Benaloh, J., Tuinstra, D.: Receipt-free Secret-ballot Elections. In: Proccedings of the Twentysixth Annual ACM Symposium on the Theory of Computing, pp. 544–553. ACM Press, New York (1994)Google Scholar
  4. 4.
    Iverson, K.R.: A cryptographic scheme for computerized general elections. LNCS 330, 405–419 (1991)Google Scholar
  5. 5.
    Sako, K.: Electronic voting system with objection to the center. In: Proccedings of the Symposium on Cryptography and Information Security, Tateshina, pp. 92–130 (1992)Google Scholar
  6. 6.
    Chen, X., Wang, Y.: Based on anonymous communication channel secure electronic voting scheme. Chinese Journal of Electronics 31(3), 390–393 (2003)Google Scholar
  7. 7.
    Chaum, D.: Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 177–182. Springer, Heidelberg (1988)CrossRefGoogle Scholar
  8. 8.
    Nurmi, H., Salomaa, A., Santean, L.: Secret Ballot Elections in Computer Networks. Computers & Security 36(10), 553 (1991)CrossRefGoogle Scholar
  9. 9.
    Iversen, K.R.: A Cryptographic Scheme for Computerized General Elections. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 405–419. Springer, Heidelberg (1992)Google Scholar
  10. 10.
    Sako, K., Kilian, J.: Secure Voting Using Partially Compatible Homomorphisms. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 411–424. Springer, Heidelberg (1994)Google Scholar
  11. 11.
    Niemi, V., Renvall, A.: How to Prevent Buying of Votes in Computer Elections. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 141–148. Springer, Heidelberg (1995)Google Scholar
  12. 12.
    Fnjioka, A., Okaloma, T., Ohla, K.: A Pracaic:a Secret voting Scaieme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)Google Scholar
  13. 13.
    Thuringiensis, Lu, N., Zhu, Y.: No one needs a central mechanism of electronic voting protocol. Computer Engineering 30(11), 96–97 (2004)Google Scholar
  14. 14.
    Gao, H., Wang, Y., Wang, J.: A net electronic voting scheme based on Mix. Chinese Journal of Electronics 32(6), 1047–1049 (2004)Google Scholar
  15. 15.
    Chen, X., Wang, J., Wang, Y.: Based on receipt-free electronic voting. Chinese Journal of Computers 26(5), 557–562 (2003)Google Scholar
  16. 16.
    Xie, J., Liu, H.: Based blind group signature secret sharing, and the new safety electronic election model. Microcomputer and Application (9), 38–42 (2000)Google Scholar
  17. 17.
    Shengli, L., Bo, Y., Yumin, W.: Based on elliptic curve cryptosystem voting protocol. Journal of Electronics 22(1), 84–89 (2000)Google Scholar
  18. 18.
    Qi, D., Shuling, S.: The electronic voting research. Computer Application 18(4), 23–25 (1998)Google Scholar
  19. 19.
    Zhang, M.: Online voting technology security. The Computer Age (3), 38–39 (2004)Google Scholar
  20. 20.
    Cheng, C., Cheng, W., Kamfai: The electronic voting system security problem (English). Computer Engineering 25(special issue), 61–64 (1999)Google Scholar
  21. 21.
    Liu, J., Fu, X., Cheng, G.: Electronic voting security and application prospects. Computer Security 12, 24–26 (2004)Google Scholar
  22. 22.
    Cranor, L.F., Cytron, R.K.: Design and implementation of a security-conscious electronic polling system. Washington University: Technical Report WUCS-96-02 (1996)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Shenyang Ligong UniversityShenyangChina

Personalised recommendations