期刊文献+

电子投票匿名性分析 被引量:2

Anonymity Analysis of Electronic Voting
下载PDF
导出
摘要 电子投票公布计票结果会影响投票者的匿名性。针对该问题,定义匿名性为投票选择的不确定度,利用熵衡量投票系统的投票者匿名性,比较计票结果公布前后投票者的匿名性变化。分析结果表明,投票规模越小,投票者匿名性在结果公布后受到的损失越大;在小规模电子投票情况下,计票结果应该选择只公布获胜者,不公布具体得票数,以减少投票者匿名的损失。 The disclosure of the number of votes can compromise the voters' anonymity of the electronic voting.Aiming at this problem,this paper defines anonymity by using the uncertainty of the voting choices and measures the anonymity of the whole voting system by entropy.It compares the anonymity after the release of the voting results with that before releasing the voting results.Analysis result shows that the smaller the voting scale is,the more the voters' anonymity loses.In the design of small-scale electronic-voting scheme,releasing the winner instead of the number of votes that candidates gained decreases the loss of anonymity.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第6期133-134,137,共3页 Computer Engineering
关键词 电子投票 匿名性 条件熵 electronic voting anonymity conditional entropy
  • 相关文献

参考文献6

  • 1Chaum D. Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms[J]. Communications of ACM, 1981, 24(2): 84-88. 被引量:1
  • 2Clarkson M R, Chong S, Myers A C. Civitas: Toward a Secure Voting System[C]//Proc. of 2008 IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Press, 2008. 被引量:1
  • 3王国瞻,亢保元,成林.多重代理盲签名分析[J].计算机工程,2010,36(8):130-131. 被引量:3
  • 4王旭,黄根勋.无收据性电子选举方案[J].计算机工程,2008,34(20):184-186. 被引量:2
  • 5Fujioka A, Okamoto T. A Practical Secret Voting Scheme for LargeScale Elections[C]//Proc. of Workshop on the Theory and Application of Cryptographic Techniques. London, UK: SpringerVerlag, 1992. 被引量:1
  • 6Vcnkitasubramaniam P, Tong Lang. Anonymous Networking with Minimum Latency in Multihop Networks[C]//Proc. of 2008 IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Computer Society, 2008. 被引量:1

二级参考文献9

  • 1Chaum D.Blind Signature for Untraceable Payments[C]//Proc.of Crypto'82.New York,USA:Plenum Press,1983:199-203. 被引量:1
  • 2Mambo M,Usuda K,Okamoto K.Proxy Signature:Delegation of the Power to Sign Message[J].IEICE Trans.on Fundamental,1996,E79-A(9):1338-1353. 被引量:1
  • 3Lu Rongxing,Cao Zhenfu,Zhou Yuan.Proxy Blind Multi-signature Scheme Without a Secure Channel[J].Applied Mathematics and Cumputation,2005,164(1):179-187. 被引量:1
  • 4Wu Lin-Chuan,Yeh Yi-Shiung,Liu Tsann-Shyong.Analysis of Sun et al.'s Linkability Attack on Some Proxy Blind Signature Shemes[J].System Software,2006,79(2):176-179. 被引量:1
  • 5Sun Hungmin,Hsieh B T,Tseng S M.On the Security of Some Proxy Blind Signature Scheme[J].System Software,2005,74(3):297-302. 被引量:1
  • 6Tan Zuowen,Liu Zhuojun,Tang Chunming.Digital Proxy Blind Signature Schemes Based on DLP and ECDLP[J].MM Research Preprints,2002,(21):212-217. 被引量:1
  • 7Benaloh J, Tuinstra D. Receipt Free Secret-ballot Elections[C]//Proc. of the 26th Symp. on Theory of Computing. New York, USA: [s. n.], 1994. 被引量:1
  • 8Hirt M, Sako K. Efficient Receipt Free Voting Based on Homomorphic Encryption[C]//Proc. of EUROCRYPT'00. [S. l.]: Springer-Verlag, 2000. 被引量:1
  • 9Lee B, Kim K. Receipt-free Electronic Voting Scheme with a Tamper-resistant Randomizer[C]//Proceedings of ICISC'02. [S. k]: Springer-Verlag, 2002. 被引量:1

共引文献3

同被引文献13

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部