Font Size: a A A

Based On The Identity Of Specific Signatures And E-elections

Posted on:2011-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:L H ChenFull Text:PDF
GTID:2208330332957615Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Today, the Computer has already been changing the way people live and work. The traditional method of election not only consumes a large amount of manpower and time, and the entire electoral process, such as: organizational activities, send ballots, votes were counted, the results are released directly from person to operate, making the fairness of the election results and effectiveness is likely to affected. The digital signature technology able to confirm the identity of the participants, to prevent the illegal means malicious forgery, theft, tampering, fraud and other unsafe behavior, in the whole electoral process can effectively prevent a variety of human factors. Therefore, the Electronic Voting came into being.The Electronic Voting (especially, digital signature technology) as the theoretical foundation, through computer and network to complete the whole process of the election. The electronic voting three important goals are to ballot privacy, system robustness and the general confirmatory. Compared with the traditional method of election, it has greater flexibility, higher efficiency, but the safety and effectiveness needs to be improved. Therefore, many scholars at home and abroad for electronic election protocol a lot of research aimed at improving system security and efficiency. In recent years, the rapid development of digital signature technology, electronic elections although made great progress, but the safety and efficiency is still a worthy subject of study.In this paper our work aiming to such a challenge is as follows:1) Introduced the Electronic Voting Protocol in the status and development trends, analyzes the strengths and weaknesses of existing electronic electoral arrangements as well as some unresolved issues.2) Introduction Elliptic Curve Scalar Multiplication, in analyzing the existing scalar multiplication algorithm is proposed based on the NAF from left to right algorithm at the same time improving the computational efficiency can save the extra storage space, and the algorithm is extended to pairs of scalar multiplication algorithm.3) Designed an identity-based proxy blind signature scheme. It combines the bulk of the benefits of signature and blind signature, and can well solve the key management issues of efficiency, security aspects of the significantly improved. 4) In proposing a special identity-based blind signature scheme based on the build a secure and efficient e-voting program, and the new e-electoral program of the safety analysis.
Keywords/Search Tags:Identity-based digital signature, Bilinear pairings, Electronic Voting, Blind Signature, Group Signature
PDF Full Text Request
Related items