期刊文献+

对Chen等人电子选举方案的密码学分析和修正 被引量:1

Cryptanalysis and Modification of Chen et al.'s E-voting Scheme
在线阅读 下载PDF
导出
摘要 2004年,Chen等人提出一个安全的匿名网络选举方案。指出Chen等人给出的方案是不安全的;另外,给出一个满足电子选举安全要求的修正方案。 In 2004,Chen et al.proposed a secure internet e-voting.In this paper,we pointed out the security weaknesses of Chen et al.'s e-voting scheme.We gave a modification which satisfies the security requirements of an e-voting scheme.
出处 《计算机科学》 CSCD 北大核心 2010年第11期97-98,125,共3页 Computer Science
基金 国家自然科学基金(No10771101) 南京理工大学自主科研专项计划资助项目(No2010ZYTS067)资助
关键词 密码学分析 电子选举 Cryptanalysis E-voting
  • 相关文献

参考文献1

二级参考文献10

  • 1Chaum D.Blind signature system[].proceedings of the Crypto.1998
  • 2Chaum D.Untraceable electronic mail, return addresses, and digital pseudonyms[].Communications of the ACM.1981
  • 3Chinchen,Chang,Wenbin,Wu.A Secure Voting System a Pubic Network[].Networks.1997
  • 4A.Riera,J.Borrell.An Uncoercible Verifiable Electronic Voting Protocol[].IT Global Security IFIP SEC’.1998
  • 5Yuyi,Chen,Jinnke,Jan,Chinling,Chen.The Design of a Secure Anonymous Internet Voting System[].Computers and Security.2004
  • 6Liaw Horng Twu.A secure electronic voting protocol for general election- s[].Computers and Security.2004
  • 7Iuon Chung Lin,Min Shiang Hwang,Chin-Chin chang.Security enhancement for anonymous secure e-voting over a network[].Computers and Standards.2003
  • 8Dini,Gianluca.A secure and available electronic voting service for a large-scale distributed system[].Future Generation Computer Systems.2003
  • 9Chaum D.Blinding for Unanticipated Signatures[].Ad- vances in Cryptology-EUROCRYPT’’ Workshop on the Theory and Application of Cryptographic Techniques.1987
  • 10Fujioka A,Okamoto T,Ohta K.A Practical Secret Voting Scheme for Large Scale Elections[].Advancesin Cryptol- ogy- AUSCRYPT’’ Workshop on the Theory and Ap- plication of Cryptographic Techniques.1992

同被引文献15

  • 1羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19. 被引量:11
  • 2Yao A. Protocol of secure computation[C]//Proceeding of the 23th IEEE Symposium on Foundations of Com- puter Science. Los Alamitos: IEEE Computer Society, 1982:160-164.
  • 3Jakobsson M, Yung M. Proving without knowing:on ob- livious,agnostic and blindfolded provers[C]//Proeeed- ings of Advances in Cryptology-CRYPTO. California: Springer Berlin Heidelberg, 1996:186-200.
  • 4Boudot F,Schoenmaker B,Traor'e J. A fair and efficient solution to the socialist millionaries ' problem[J]. Discrete Applied Mathematics,2001,111(1/2) :23-36.
  • 5Cramer R. Introduction to secure computation[M]// Lectures on Data Security, Modern Cryptology in Theo- ry and Practice. Berlin: Springer, 1999.
  • 6Naor M, Pinkas B. Efficient oblivitras transfer protocols [C]//Proceedings of the 12th annual ACM-SIAM symposium on Discrete algorithms. Philadelphia: Soci- ety for Industrial and Applied Mathematics, 2001:448- 457.
  • 7Aiello W, Ishai Y, Reingold O. Priced oblivious trans- fer: How to sell digital goods[C]//Proceedlngs of In- ternational Conference on the Theory and Application of Cryptographic Techniques Innsbruck. Austria: Springer Berlin Heidelberg,2001 : 119-135.
  • 8Lipmaa H. Verifiable homom0rphic oblivious transfer and private equality test[C]//Proceedings of the 9th International Conference on the Theory and Applica- tion of Cryptology and Information Security. Taipei: Springer Berlin Heidelberg,2003:416-433.
  • 9Kruger L,Jha S,Goh E J,et al. Secure function evalua- tion with ordered binary decision diagrams [C]//Pro- ceedings of the 13th ACM conference on Computer and communications security. New York: ACM Press, 2006 : 410-420.
  • 10刘文,罗守山,陈萍.基于滑动窗口和交换加密函数解决SMP的新方案[J].计算机工程,2007,33(22):163-165. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部