Advertisement

A multi-recastable ticket scheme for electronic elections

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1163)

Abstract

In this paper, we propose a multi-recastable ticket scheme for electronic elections based on blind signatures. In our election scheme, every voter of a group can obtain an m-castable ticket (m-ticket). Through the m-ticket, the voter can participate in m different designated elections held in this group. In each of the m elections, the voter can cast his vote by making appropriate modifications to the m-ticket. To obtain an m-ticket from the authority, only one round of registration is required for the voter. It turns out that our scheme greatly reduces the network traffic between the voters and the authority. The security of our scheme relies on the difficulty of solving the square roots of an integer in Z n * . In the proposed scheme, the identities of voters are protected against the authority by means of the blind signature techniques, and it is infeasible for an intruder to forge any legal vote in this scheme due to the properties of quadratic residues.

Keywords

Blind Signature Extraction Stage Quadratic Residue Blind Signature Scheme Election Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boyd, C. A.,’ A new multiple key ciphers and an improved voting scheme,’ Advances in Cryptology-EUROCRYPT'89, LNCS 434, Springer-Verlag, 1990, pp. 617–625.Google Scholar
  2. 2.
    Benaloh, J. C. and Tuinstra, D.,’ Receipt-free secret-ballot elections,’ Proc. 26th ACM Symp. on the Theory of Computing, 1994, pp. 544–553.Google Scholar
  3. 3.
    Chaum, D.,’ Untraceable electronic mail, return addresses, and digital pseudonyms,’ Communications of the ACM, vol. 24, no. 2, 1981, pp. 84–88.CrossRefGoogle Scholar
  4. 4.
    Chaum, D., Fiat, A., and Naor, M.,’ Untraceable electronic cash,’ Advances in Cryptology-CRYPTO'88, LNCS 403, Springer-Verlag, 1982, pp. 319–327.Google Scholar
  5. 5.
    Chaum, D.,’ The dining cryptographers problem: unconditional sender and recipient untraceability,’ Journal of Cryptology, vol. 1, 1988, pp. 65–75.CrossRefGoogle Scholar
  6. 6.
    Cohen, J. D. and Fisher, M. J.,’ A robust and verifiable cryptographically secure election scheme,’ Proc. 26th IEEE Symp. on Foundations of Computer Science, 1985, pp. 372–382.Google Scholar
  7. 7.
    Fan, C. I. and Lei, C. L.,’ Efficient blind signature scheme based on quadratic residues,’ Electronics Letters, vol. 32, no. 9, 1996, pp. 811–813.CrossRefGoogle Scholar
  8. 8.
    Fan, C. I. and Lei, C. L.,’ Low-computation blind signature schemes based on quadratic residues,’ Technical Reports, Department of Electrical Engineering, National Taiwan University, R.O.C., 1996.Google Scholar
  9. 9.
    Fujioka, A., Okamoto, T. and Ohta, K.,’ A practical secret voting scheme for large scale elections,’ Advances in Cryptology-AUSCRYPT'92, LNCS 718, Springer-Verlag, 1992, pp. 244–251.Google Scholar
  10. 10.
    Iversen, K. R.,’ A cryptographic scheme for computerized general elections,’ Advances in Cryptology-CRYPTO'91, LNCS 576, Springer-Verlag, 1991, pp. 405–419.Google Scholar
  11. 11.
    Juang, W. S., Lei, C. L. and Fan, C. I.,’ A collision free secret ballot protocol for computerized general elections,’ International Computer Symposium, Taiwan, R.O.C., 1994. (A revised version will appear in Computers & Security.)Google Scholar
  12. 12.
    Nurmi, H., Salomaa, A. and Santean, L.,’ Secret ballot elections in computer networks,’ Computers & Security, vol. 10, 1991, pp. 553–560.Google Scholar
  13. 13.
    Peralta, R. C.,’ A simple and fast probabilistic algorithm for computing square roots modulo a prime number,’ IEEE Trans. Inform. Theory, vol. 32, no. 6, 1986, pp. 846–847.CrossRefGoogle Scholar
  14. 14.
    Pohlig, S. and Hellman, M. E.,’ An improved algorithm for computing logarithms over GF(p) and its cryptographic significance,’ IEEE Trans. on Inform. Theory, vol. 24, 1978, pp. 106–110.CrossRefGoogle Scholar
  15. 15.
    Park, C., Itoh, K. and Kurosawa, K.,’ All/nothing election scheme and anonymous channel,’ Advances in Cryptology-EUROCRYPT'93, LNCS 765, Springer-Verlag, 1993, pp. 248–259.Google Scholar
  16. 16.
    Pollard, J. M. and Schnorr, C. P.,’ An efficient solution of the congruence x 2+ky 2 m (mod n),’ IEEE Trans. Inform. Theory, vol. 33, no. 5, 1987, pp. 702–709.CrossRefGoogle Scholar
  17. 17.
    Rabin, M. O.,’ Digitalized signatures and public-key functions as intractable as factorization,’ Techhhhnical Report, MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass. Jan. 1979.Google Scholar
  18. 18.
    Rivest, R. L., Shamir, A. and Adleman, L.,’ A method for obtaining digital signatures and public key cryptosystems,’ Communications of the ACM, vol. 21, no. 2, 1978, pp. 120–126.CrossRefGoogle Scholar
  19. 19.
    Sako, K. and Kilian, J., 'secure voting using partially compatible homomorphisms,’ Advances in Cryptology-CRYPTO'94, LNCS 839, Springer-Verlag, 1994, pp. 411–424.Google Scholar
  20. 20.
    Slessenger, P. H.,’ Socially secure cryptographic election scheme,’ Electronics Letters, vol. 27, no. 11, 1991, pp. 955–957.Google Scholar

Copyright information

© Springer-Verlag 1996

Authors and Affiliations

  1. 1.Department of Electrical EngineeringNational Taiwan UniversityTaipeiTaiwan, R.O.C.

Personalised recommendations