Font Size: a A A

Research On Security E-voting Protocol

Posted on:2008-02-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360272468822Subject:Information security
Abstract/Summary:PDF Full Text Request
As an important research field in computer security, E-voting (Electronic voting), with encryption as its theoretical foundation, completes the whole process of voting through computer and network. With high efficiency and flexibility, it is convenient,fast,energy-saving and economic. By using public key encryption system, numerical signature, anonymous channel and zero knowledge, etc., e-voting protocol can satisfy the security requirements (maturity, anonymity, secrecy and fairness) in voting process.E-voting protocol is the core of e-voting system. From the beginning of research on e-voting to now, many voting protocols are proposed among which FOO protocol is the most representative. At present, e-voting system based on FOO protocol is proposed both in China and abroad. However, there exist obvious security defects in the e-voting system nowadays, and the main cause for this is the excessive dependence on voting organization. Besides, the voting organization is entitled too many rights and people pay too much attention to anonymity of votes.Therefore, in consideration of defects in FOO protocol, an e-voting protocol with group signature as its core is designed. In this new protocol, management organization for collective signature doesn't exist, instead of it is a group administrator to entitle the legible voter to join group signature. This greatly improves votes'security and decreased the possibility of embezzlement by administrative organization and tally organization. In the meanwhile, the brand new concept of list signature is helpful to expand group signature, to effectively restrict user's signature time and to increase the functions of public inspection and public identification inspection. The new voting protocol abides by several principals which are indispensable to security e-voting protocol: standardization, integrity, exclusiveness, efficiency, fairness, flexibility, verifiability and anonymity.Finally, with the core of voting protocol based on list signature, I have designed the e-voting system hierarchy and function modules and put forward a practical and secure e-voting system scheme. I have analyzed the disadvantages and defects of the new system and advanced the perfection direction in the future.
Keywords/Search Tags:E-voting Protocol, Group Signature, List Signature, Anonymous Channel
PDF Full Text Request
Related items