期刊文献+

一种存在多类投票人的电子投票方案

Electronic voting scheme with multiclass of voters
在线阅读 下载PDF
导出
摘要 给出了一个新的实用的电子投票协议,主要采用了基于双线性对的门限部分盲签名方案和比特承诺技术。门限签名方案将密钥进行分享,限制了由单个签名者所组成的系统的不安全性。而通过部分盲签名技术的使用,可以使签证中心将投票人类别标识嵌入到签名信息中,进行分类统计。该协议不仅满足一个理想电子投票系统的基本性质,而且增加了安全性和灵活性,是一个较为实用的方案。 A new and practical electronic voting scheme is proposed by using threshold partially blind signature scheme from bilinear pairing and bit commitment technology.A threshold signature scheme distributes the signing abilities to a group of signers and avoids the system insecurity.Using partially blind signature,authentication center can insert the identification of voter's class into signatures and count the view of different classes.This protocol has all properties of an ideal protocol and also enhances the security and flexibility.It has practicality.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第11期232-234,共3页 Computer Engineering and Applications
关键词 电子投票 门限签名 部分盲签名 双线性对 比特承诺 electronic voting threshold signature partially blind signature bilinear pairing bit commitment
  • 相关文献

参考文献7

二级参考文献26

  • 1姚立,李仲麟.一个实用的电子投票协议的设计[J].华南理工大学学报(自然科学版),1997,25(5):99-103. 被引量:8
  • 2卢开澄.计算机密码学[M].北京:清华大学出版社,1999.153-158.
  • 3Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Desmedt Y, Frankel Y, eds. Advances in Cryptology-CRYPTO'91. LNCS, Berlin: Springer-Verlag, 1992. 457-469.
  • 4Harn L. Group-Oriented (t,n)-threshold digital signature scheme based on discrete logarithms. IEEE Proc. Computers and Digital Techniques, 1994,141(5):307-313.
  • 5Wang GL, Qing SH. A threshold undeniable signature scheme without a trusted party. Journal of Software, 2002,13(9):1758-1764 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/13/1758.pdf
  • 6Takaragi K, Miyazaki K, Takahashi M. A threshold digital signature issuing scheme without secret communication. 1998. http:// grouper.ieee.org/groups/1363/StudyGroup/Threshold.html
  • 7Bellare M, Micciancio D, Warinschi B. Foundations of group signatures: Formal definitions, simplified requirements, and a constructions based on general assumptions. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin: Springer-Verlag, 2003. 614-629.
  • 8Shi Y, Feng DG. The design and analysis of a new group of (tj,t,n) threshold group-signature scheme. In: Wang EF, Yang WC, eds. Proc. of the CHINACRYPT 2000. Beijing: Science Press, 2000. 156-159 (in Chinese with English abstract).
  • 9Shoup V. On the deterministic complexity of factoring polynomials over finite fields. Information Processing Letters, 1990,33: 261-267.
  • 10Feng DG, Pei DY. Introduction to Cryptology. Beijing: Science Press, 1999. 235-236 (in Chinese).

共引文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部