Abstract
An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter’s voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie’s supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob’s dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.
Similar content being viewed by others
References
Jan, J.K., Tai, C.C.: A secure electronic voting protocol with IC cards. J. Syst. Softw. 39(12), 93–101 (1997)
Ku, W., Wang, S.D.: A secure and practical electronic voting scheme. Comput. Commun. 22(3), 279–286 (1999)
Tian, J.H., Zhang, J.Z., Li, Y.P.: A quantum multi-proxy blind signature scheme based on genuine four-qubit entangled state. Int. J. Theor. Phys., 809–816 (2015)
Shao, A.X., Zhang, J.Z., Xie, S.C.: A quantum multi-proxy multi-blind-signature scheme based on genuine six-qubit entangled state. Int. J. Theor. Phys. 55, 5216–5224 (2016)
Fan, C.I., Lei, C.L.: A sessional blind signature based on quantum cryptography. Electron. Lett. 32(9), 811–813 (1996)
Hillery, M.: Quantum voting and privacy ptotection: first steps. Int. Soc. Opt. Eng. doi:10.1117/2.1200610.0419 (2006)
Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)
Wen, X.J., Cai, X.J.: Secure quantum voting protocol. Shangdong Univ.(Natural Science) 46(9), 9–13 (2011)
Yi, Z., He, G.Q., Zeng, G.H.: Quantum voting protocol using two-mode squeezed states. Acta Phys. Sin. 58(5), 3166–3172 (2009)
Horoshko, D., Kilin, S.: Quantum anonymous voting with anonymity check. Phys. Lett. A 375(8), 1172–1175 (2011)
William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, New York (2003)
Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)
Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)
Lysyanskaya, A., Ramzan, Z.: Group Blind Digital Signature: A Scalable Solution to Electronic Cash. In: Proceedings of the 2nd Financial Cryptography Conference (1998)
Mohammed, E., Emarah, A.E., El-Shennawy, K.: Information systems for enhanced public safety and security 33 (2000)
Chien, H., Jan, J., Tseng, Y.: Eighth international conference on parallel and distributed systems (ICPADS01) 44 (2001)
Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654 (2011)
Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51, 455–461 (2012)
Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55(5), 2303–2310 (2016)
Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)
Wen, X.J., Tian, Y., Niu, X.M.: A strong blind quantum signature scheme protocol based on secret sharing. Acta Electron. Sin. 38(3), 720–724 (2010)
Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of the International Conference on Computers, pp 175–179 (1984)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
Mayers, D.: Unconditional security in quantum cryptography. J. Assoc: Comput. Math. 48(1), 351–406 (2001)
Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)
Wang, T.Y., Cai, X.Q., Zhang, J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)
Cao, F., Cao, Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)
Wang, M.L., Ma, W.P., Shen, D.S., et al.: A quantum dialogue protocol based on four-qubit entangled state. Int. J. Theor. Phys. 54(4), 1388–1395 (2015)
Guo, W., Zhang, J.Z., Li, Y.P., et al.: Multi-proxy strong blind quantum signature scheme. Int. J. Theor. Phys. 55(8), 3524–3536 (2016)
Xia, Z.H., Wang, X.H., Sun, X.M., et al.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Xia, Z.H., Wang, X.H., Zhang, L.G., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Wang, T.Y., Li, Y.P., Zhang, R.L.: Analysis of counterfactual quantum certificate authorization. Int. J. Theor. Phys. 55(12), 5331–5335 (2016)
Cao, H.J., Ding, L.Y., Yu, Y.F., et al.: A electronic voting scheme achieved by using quantum proxy signature. Int. J. Theor. Phys. 55(9), 4081–4088 (2016)
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant No. 61402275, 61402015, 61273311), the Natural Science Foundation of Shaanxi Province (Grant No. 2015JM6263, 2016JM6069), and the Fundamental Research Funds for the Central Universities(Grant No. GK201402004).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, JL., Xie, SC. & Zhang, JZ. An Elaborate Secure Quantum Voting Scheme. Int J Theor Phys 56, 3019–3028 (2017). https://doi.org/10.1007/s10773-017-3468-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-017-3468-6