Font Size: a A A

The Designing And Realization Of Electronic Voting System And Its Identity Authentication And Voting Protocol

Posted on:2005-01-20Degree:MasterType:Thesis
Country:ChinaCandidate:J LuFull Text:PDF
GTID:2168360125463939Subject:Pattern recognition and intelligent systems
Abstract/Summary:PDF Full Text Request
Voting is a behavior that often takes place in people's daily life. With the progress of era, it has already no longer only confined to the political activity. In recent years, voting activities increases tempestuously. The traditional craft voting which can't guarantee the security and fairness can't meet the present voting demand because of the low efficiency and the waste of the financial resources and manpower. Then the electronic voting arises at the historic moment. Electronic voting which is based on all kinds of cryptology technolo- gies is one of the research fields of cryptology. The whole process of voting recurs to the computer and network. It can save time and financial resources and manpower. It has very high efficiency and flexibility. Because of the characteristics of cryptology technology and electronic voting's own, extensive researches into guaranteeing the security and the practicality are performing at present.We must ensure the following important properties must be provided by any secure electronic voting scheme: Accuracy, Completeness, Conveni- ence, Democracy, Efficiency, Fairness, Flexibility, Verifiability, Privacy and Non-mandatory. The purpose of this paper is to design and realize one electronic voting system used on the Internet.Using in the opening net, network security is an important problem. In addition, the voting system needs to protect the voters' privacy. For these reasons, we develop one identity authentication algorithm for the voting system at first in this paper. The algorithm with challenge/response style, adopting RSA key mechanism, realizes the two-way authentications of voters and voting centers.Voting protocol is the core of the voting system. From the beginning of studying electronic voting, many protocols have been proposed. The FOO protocol is representative relatively among them. This paper has carried detailed analysis on FOO and found several shortages in FOO. Based on the FOO protocol, we design a new protocol called VonRSA whose core is RSA keys. The protocol assigns the power of voting centre to five sub-centers. This has improved the security of voting greatly, has reduced the possibility of that the centers jointly practice fraud of voting. In addition, the protocol introduces one stage of pre-voting also, in which the special blank ballots including not only original texts but also cryptograph are produced. With strict analysis, we think VonRSA has solved FOO's problems, satisfied the relevant security requests, and whose realization is also quite simple.Based on the VonRSA protocol and the authentication algorithm, we design the hierarchical and the functional structures of the electronic voting system at last in the paper. Because Java has supported the cryptology very well, we select Java as our programming language. Combining the SQL Server 2000 database, we realize the key parts of the electronic voting system.
Keywords/Search Tags:electronic voting, identity authentication, protocol, hash fuction, RSA, Java
PDF Full Text Request
Related items