Font Size: a A A

Research On Electronic Election Scheme For Multi - Candidates Based On Homomorphism

Posted on:2017-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:S J HuangFull Text:PDF
GTID:2206330485463011Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Election is an important way to achieve democratic citizenship in modern society. Compared with the traditional approach, based on cryptography, electronic voting election can effectively avoid the phenomenon of favoritism in each section, and tends to be much faster and more accurate in vote counting. Chaum proposed the prototype of electronic voting scheme proposed in his e-mail hybrid protocol based on Mix-net. After that, more and more electronic voting schemes has been proposed, such as the electronic voting scheme based on the secret sharing scheme, the electronic voting scheme based on blind signature and the electronic voting scheme based on homomorphic encryption. These electronic voting schemes use public-key cryptography to encrypt the votes to protect the identities of voters.The Public-key cryptography technology is that researches use the Hard Problems in Number Theory to construct encryption algorithm, so that attackers cannot decrypt cipher text in the polynomial time. Public-key cryptography technology is also used in electronic voting scheme and electronic signature scheme.By doing the research of different kinds of electronic voting schemes and encryption algorithm with homomorphic encryption,I find the defects in the exited electronic voting schemes. The scheme proposed in this paper constructs the security electronic vote form to fulfil requirement that voters can choose from many candidates. This scheme uses Paillier public-key encryption to encrypt the votes and RSA public-key encryption to sign on the votes. Through these ways, attackers cannot replace voters’ votes and make sure that electronic vote can process successfully.By comparing with other scheme, the required time of generating the public and secret keys, I do comprehensive analysis to the scheme proposed in this paper. Finally, this paper summarizes the problem this scheme has perfected and in the future this scheme still has room for further improvement.
Keywords/Search Tags:Electronic vote, Homomorphic Encryption, Paillier Public key cryptography, RSA Public key cryptography, Addition homomorphic
PDF Full Text Request
Related items