Skip to main content
Log in

An Elaborate Secure Quantum Voting Scheme

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter’s voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie’s supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob’s dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Jan, J.K., Tai, C.C.: A secure electronic voting protocol with IC cards. J. Syst. Softw. 39(12), 93–101 (1997)

    Article  Google Scholar 

  2. Ku, W., Wang, S.D.: A secure and practical electronic voting scheme. Comput. Commun. 22(3), 279–286 (1999)

    Article  Google Scholar 

  3. Tian, J.H., Zhang, J.Z., Li, Y.P.: A quantum multi-proxy blind signature scheme based on genuine four-qubit entangled state. Int. J. Theor. Phys., 809–816 (2015)

  4. Shao, A.X., Zhang, J.Z., Xie, S.C.: A quantum multi-proxy multi-blind-signature scheme based on genuine six-qubit entangled state. Int. J. Theor. Phys. 55, 5216–5224 (2016)

    Article  MATH  Google Scholar 

  5. Fan, C.I., Lei, C.L.: A sessional blind signature based on quantum cryptography. Electron. Lett. 32(9), 811–813 (1996)

    Article  Google Scholar 

  6. Hillery, M.: Quantum voting and privacy ptotection: first steps. Int. Soc. Opt. Eng. doi:10.1117/2.1200610.0419 (2006)

  7. Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)

    Article  ADS  Google Scholar 

  8. Wen, X.J., Cai, X.J.: Secure quantum voting protocol. Shangdong Univ.(Natural Science) 46(9), 9–13 (2011)

    MathSciNet  Google Scholar 

  9. Yi, Z., He, G.Q., Zeng, G.H.: Quantum voting protocol using two-mode squeezed states. Acta Phys. Sin. 58(5), 3166–3172 (2009)

    Google Scholar 

  10. Horoshko, D., Kilin, S.: Quantum anonymous voting with anonymity check. Phys. Lett. A 375(8), 1172–1175 (2011)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  11. William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, New York (2003)

    Google Scholar 

  12. Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)

    Article  Google Scholar 

  13. Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)

    Article  Google Scholar 

  14. Lysyanskaya, A., Ramzan, Z.: Group Blind Digital Signature: A Scalable Solution to Electronic Cash. In: Proceedings of the 2nd Financial Cryptography Conference (1998)

    Google Scholar 

  15. Mohammed, E., Emarah, A.E., El-Shennawy, K.: Information systems for enhanced public safety and security 33 (2000)

  16. Chien, H., Jan, J., Tseng, Y.: Eighth international conference on parallel and distributed systems (ICPADS01) 44 (2001)

  17. Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654 (2011)

    Article  ADS  Google Scholar 

  18. Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51, 455–461 (2012)

    Article  MATH  Google Scholar 

  19. Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55(5), 2303–2310 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  20. Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)

    Article  ADS  Google Scholar 

  21. Wen, X.J., Tian, Y., Niu, X.M.: A strong blind quantum signature scheme protocol based on secret sharing. Acta Electron. Sin. 38(3), 720–724 (2010)

    Google Scholar 

  22. Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of the International Conference on Computers, pp 175–179 (1984)

    Google Scholar 

  23. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)

    Article  ADS  Google Scholar 

  24. Mayers, D.: Unconditional security in quantum cryptography. J. Assoc: Comput. Math. 48(1), 351–406 (2001)

    MathSciNet  MATH  Google Scholar 

  25. Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)

    Article  ADS  Google Scholar 

  26. Wang, T.Y., Cai, X.Q., Zhang, J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)

    Google Scholar 

  27. Cao, F., Cao, Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang, M.L., Ma, W.P., Shen, D.S., et al.: A quantum dialogue protocol based on four-qubit entangled state. Int. J. Theor. Phys. 54(4), 1388–1395 (2015)

    Article  MATH  Google Scholar 

  29. Guo, W., Zhang, J.Z., Li, Y.P., et al.: Multi-proxy strong blind quantum signature scheme. Int. J. Theor. Phys. 55(8), 3524–3536 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  30. Xia, Z.H., Wang, X.H., Sun, X.M., et al.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)

    Article  Google Scholar 

  31. Xia, Z.H., Wang, X.H., Zhang, L.G., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  32. Wang, T.Y., Li, Y.P., Zhang, R.L.: Analysis of counterfactual quantum certificate authorization. Int. J. Theor. Phys. 55(12), 5331–5335 (2016)

    Article  MATH  Google Scholar 

  33. Cao, H.J., Ding, L.Y., Yu, Y.F., et al.: A electronic voting scheme achieved by using quantum proxy signature. Int. J. Theor. Phys. 55(9), 4081–4088 (2016)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant No. 61402275, 61402015, 61273311), the Natural Science Foundation of Shaanxi Province (Grant No. 2015JM6263, 2016JM6069), and the Fundamental Research Funds for the Central Universities(Grant No. GK201402004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-Zhong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, JL., Xie, SC. & Zhang, JZ. An Elaborate Secure Quantum Voting Scheme. Int J Theor Phys 56, 3019–3028 (2017). https://doi.org/10.1007/s10773-017-3468-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-017-3468-6

Keywords

Navigation