期刊文献+

安全电子选举研究

Research on secure electronic voting scheme
下载PDF
导出
摘要 提出安全电子选举的三级目标和一般模型,为系统地研究电子选举提供了基础.通过对现有方案的关键技术分析,提出保护隐私的电子评审、含权选举、“m选k”等特殊投票问题,并给出采用安全多方计算技术解决这些问题的新方法. The three level securities of the e - voting are proposal and a general e - voting model is constructed that provide all important parameter to design the election scheme. The key protocols of implementation secure e - voting is analyzed. Several special e - voting problems are raised including electronic jury voting, weighted eevoting and " k - out -of- m " election etc. Several new solutions for these problem are introduced which based on secure multiparty computation protocols. Some major threads and emerging trends of research in this area are outlined.
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2007年第3期20-26,共7页 Journal of Anhui University(Natural Science Edition)
基金 国家自然科学基金资助项目(60573171) 安徽省自然科学基金资助项目(070412051) 安徽省高校省级重点自然科学研究基金资助项目(KJ2007A043) 安徽大学人才建设基金资助项目
关键词 电子选举 安全性 安全多方计算 e - voting security secure multi - party computation
  • 相关文献

参考文献13

  • 1Cohen J,J Fischer,M M.A Roust and Verifiable Cryptographically Secure Election Scheme[C].Proc.26th IEEE Symposium on the Foundation of Computer Science (FOCS' 85) Proc.26th IEEE Symp.On Foundations of Computer Science,Portland:IEEE,1985:372-382. 被引量:1
  • 2Benaloh J,J Yung M,M.Distributing the Power of a Government to Enhance the Privacy of Voters[C].Proc.5thProc.5th ACM Symposium Symp.on Principles of Distributed Computing,New York:ACM,1986:52 -62. 被引量:1
  • 3Benaloh J.Verifiable Secret-Ballot Elections[D].Ph.D thesis Yale University,Department of Computer Science,New Hhaven,CT,September,1987. 被引量:1
  • 4Fujioka A,Okamoto T,Ohta K.A practical secret voting scheme for large scale elections[C].In Advances in Cryptology (-AUSCRYPT 92),LNCS 718,Berlin:Springer-Verlag,1992:244-251. 被引量:1
  • 5Cramer R,Gennaro R,Schoenmakers B.A secure and optimally efficient multi-authority election scheme[C].In Advances in Cryptology (-EUROCRYPT97),LNCS 1223,Berlin:Springer-Verlag,1997:103-118. 被引量:1
  • 6Benaloh J,Tuinstra D.Receipt-free secret-ballot elections[C].Proc.26th ACM Symposium on Theory of Computing (STOC94),New York:ACM Press,1994:544-553. 被引量:1
  • 7Jules A,Jakobsson M.Coercion -Resistant Elections[EB/OL].(2002 -08 -09)[2006 -09-10] http://eprint.iacr.org/2002/165. 被引量:1
  • 8Cranor L,Cytron R.Sensus:A security-conscious electronic polling system for the Internet[C].Proc.Thirtieth Hawaii International Conference on System Sciences.Wailea,Hawaii,USA,1997 (3):561-570. 被引量:1
  • 9Schoenmaker B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[C].In Advances in Cryptology(CRYPTO99) In Advances in Cryptology Crypto99,LNCS,Berlin:Springer-Verlag,1999,1666:148-164. 被引量:1
  • 10仲红,黄刘生,罗永龙.一个实用的电子评审方案[J].小型微型计算机系统,2007,28(1):178-181. 被引量:6

二级参考文献22

  • 1J Benaloh, D Tuinstra. Receipt-free secret-ballot elections [C].In: Proc of the 26th ACM Symposium on Theory of Computing. New York: ACM Press, 1994. 544-553 被引量:1
  • 2J Groth. Efficient maximal privacy in boardroom voting and anonymous broadcast [G]. In: Proc of the 8th Int'l Conf on Financial Cryptography ( FC2004 ), LNCS 3110. Berlin:Springer-Verlag, 2004. 90-104 被引量:1
  • 3R Cramer, M Franklin, B Schoenmakers, et al. Multauthority secret-ballot elections with linear work [G]. In: Advances in Cryptology-Eurocrypt' 96, LNCS 1070. Berlin: Springer-Verlag, 1996. 72-83 被引量:1
  • 4R Cramer, R Gennaro, B Schoenmakers. A secure and optimally efficient multi-authority election scheme [G]. In:Advances in Cryptology-Eurocrypt' 97, LNCS 1223. Berlin:Springer-Verlag, 1997. 103-118 被引量:1
  • 5I Damgard, M Jurik. A generalisation, a simplication and some applications of Paillier' s probabilistic public-key system [G].In: The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001 ), LNCS 1992. Berlin:Springer-Verlag, 2001. 119-136 被引量:1
  • 6O Goldreich. Secure multi-party computation (working draft)[OL]. http://www. wisdom. weizmann. ac. il/home/oded/publichtml/foc. html, 1998 被引量:1
  • 7K H Rosen. Elementary Number Theory and Its Applications[M]. New York: Addition Wesley, 1984 被引量:1
  • 8H Cohen. A Course in Computational Algebraic Number Theory[M]. Berlin: Springer, 1993 被引量:1
  • 9D E Knuth. The Art of Computer Programming: Semi-Numerical Algorithms [M]. Volume 2. New York: Addition Wesley, 1981 被引量:1
  • 10J C Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret [G]. In: Advances in Cryptology-Crypto' 86,LNCS 263. Berlin: Springer-Verlag, 1986. 251-260 被引量:1

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部