期刊文献+

基于公共云的安全电子投票协议分析与设计

Analysis and Design of Secure Electronic Voting Protocol Based on Public Cloud
在线阅读 下载PDF
导出
摘要 电子投票具有海量数据和实时性的特点,且需要大规模数据运算,导致传统方案往往难于部署。公共云具有的强大计算和存储能力,给大规模电子投票系统的部署带来新的机遇,但同时也对安全性保障方面提出了新的挑战。本文提出了一种基于多公共云的安全电子投票协议,可以充分利用公共云处理大量数据的能力,并能有效保证电子投票系统的安全可靠性。安全性和性能分析表明,所提出方案可以满足电子投票系统的安全需求,同时能够节省计算开销和通信开销。 Electronic voting,characterized by massive data and real time,needs large-scale data operations.These characteristics lead to the failure of deploying traditional plan. Public cloud has a strong computing and storage capacity that can bring new opportunities for the deployment of large-scale electronic voting systems.However,it also brings about new challenges in security. By introducing the widely available public cloud with strong computing and storage ability,this paper proposes a secure electronic voting protocol based on multi-public cloud,which can make full use of the ability of public cloud to process large amounts of data and ensure the electronic voting system secure. The security and performance analysis shows that the proposed protocol can meet the security requirements of the electronic voting system while saving computing and communication expenses.
作者 刘玉
机构地区 合肥学院管理系
出处 《湖北第二师范学院学报》 2017年第8期50-55,共6页 Journal of Hubei University of Education
基金 安徽省教育厅人文重点项目(SK2016A0775) 安徽省教育厅人文重点项目(SK2016A0768) 安徽省教育厅教学研究一般项目(2015jyxm313) 合肥学院优秀青年人才支持计划(16YQ12RC)资助
关键词 电子投票 公共云 半可信 审计 electronic voting public cloud semi-trust audit
  • 相关文献

参考文献3

二级参考文献40

  • 1谢金宝,刘晖波.电子选举系统的基本框架与信息流程[J].计算机工程,2000,26(S1):97-102. 被引量:8
  • 2夏静波,张四兰,陈建华.一个无收据的高效电子选举方案[J].武汉大学学报(理学版),2006,52(3):340-344. 被引量:3
  • 3仲红,黄刘生,罗永龙.基于安全多方求和的多候选人电子选举方案[J].计算机研究与发展,2006,43(8):1405-1410. 被引量:40
  • 4Chaum D. Untraceable electronic mail, return addresses, and digi- tal pseudonyms[J]. Communications o the ACM, 1981,24(2) .. 84-88.
  • 5Cohen J, Fisher M. A robust and verifiable eryptographically se- curity election scheme[C]//Proceedings of the 26th ACM Sym- posium on Foundations of Computer Science. 1985:372-382.
  • 6Benaloh J, Tuinstra D. Receipt-free secret-ballot elections (ex- tended abstract)[C]//Proceedings of the 26th ACM Sympo- sium on Theory of Computing. 1994 : 544-553.
  • 7Iversen K R. A cryptographic scheme for computerized general elections[M]///Advances in Cryptology-CRYPTO' 91. Spinger, 1992:405-419.
  • 8Sako K,Kilian J. Secure voting using patially compatiable homo- morphisms[M]//Advances in Cryptology-CRYPTO' 94. Spring- er, 1994:405-419.
  • 9Essex A, Hengartner U. Hover: Trustworthy elections with hash-only verification[J]. IEEE Security 8 Privacy, 2012, 10 (5) : 18-24.
  • 10Chen X, Wu Q, Zhang F, New receipt-free voting scheme using double-trapdoor commitment [J]. Information Sciences, 2011,181(8):1493-1502.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部