Font Size: a A A

Cryptography Algorithms In Secure Electronic Voting

Posted on:2006-11-23Degree:MasterType:Thesis
Country:ChinaCandidate:L L HeFull Text:PDF
GTID:2168360155955230Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Electronic voting employs computer and network technologies to realize the voting function, which is based on cryptography. Voting administrator doesn' t have to provide a large number of artificial ballots or carry on the work of counting the ballots and voters don' t have to go to the regular voting center. Comparing with the traditional voting mode, electronic voting is more impartial, more secure, more efficient and more flexible, which can reduce man-made factors greatly. Furthermore, cryptography theory and application involving in electronic voting can be used for reference to the other aspects of electronic security fields. Therefore, it is of significance to the study of electronic voting. And how to use the advantage of electronic voting thereby designs a more secure and more applicable electronic voting is also a hot issue in the security field.In chapter I, the thesis introduces the basic theory of cryptography involving in the electronic voting and makes a brief introduction about the natures of the secure electronic voting and then analyzes some typical secure electronic voting finding that there is inadequacy in the security and operation. Then in chapter II the thesis proposes a secure electronic voting system based on an anonymous communication channel, group signature protocol, secret sharing and timed commitment. And the system adopts an entrusted third party as group administrator, considering voters as a group member and granting the voting rights to the voters themselves. In doing this, the system guarantees that illegal voters cannot counterfeit ballots and the unconditional anonymity of legal ballots, and the voting organization can confirm the voting qualification of voters without even testing and verifying voters. As for the way of sending ballots, the system...
Keywords/Search Tags:Cryptography, Electronic Voting, Group Signature, Timed Commitment, Secret Sharing Schemes
PDF Full Text Request
Related items