Font Size: a A A

The Research About A Secret Tallying Multi-Candidate Electronic Voting Protocol

Posted on:2009-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:G Z XuFull Text:PDF
GTID:2178360245471780Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Electronic voting as a electronic form of the tradition voting, not only can save manpower and material resources, but also is convenient, flexible and security, meanwhile guarantee the interests of the voters and the fairness of the voting results. Therefore, electronic voting has been welcomed by more and more people, and become the inevitable trend of this field. Electronic voting has become one of hotspots of scientific research workers.This dissertation first introduces the electronic voting's developement process and its application in some countries, as well as related basic knowledge of cryptography; Then analyses two typical protocol; On this basis, using cryptography technology, we design the electronic voting protocol both meeting the secure requirements of electronic voting, and running on the internet; Fianlly, we achieve a prototype of electronic voting.We proposed the electronic voting protocol based on the homomorphic encryption. The protocol can realize not only the election of individual candidates, but also multi-candidate elections, making the protocol more suitable for practical needs; Using the characteristics of homomorphic encryption, votes is transmitted in the form of cryptograph, so ,this can guarantee the secrecy of the ballot; We also use the so-called "blank votes" technology to meet the characteristics of the secret Tallying, the privacy of voters attains the absolute protection; In this dissertation, a voting protocol without Certification Authority is dedigned , it makes Certification Authority's fraud cann't be occurred; The use of zero knowledge proof makes that all legitimate votes can be counted in the final results; Applying digital signature technology to the protocol to make the unlawful data is not received, meanwhile, prevent voter from malicious repeat voting.The security analysis of electronic voting protocol is presented in this dissertation, electronic voting protocol to satisfied a number of security features is proposed and preventive measures to the possible attack is analyzed, analysis has shown that the protocol is secure; We design electronic voting protocol and implement an electronic voting system prototype, moreover verify the feasibility and correctness of the voting protocol in the actual environment. The experiment has showed that the protocol is feasible.
Keywords/Search Tags:Cryptography, Electronic Voting, Homomorphic Encryption, Secret Tallying, Multi-Candidate
PDF Full Text Request
Related items