Font Size: a A A

Secret Sharing Scheme In The Application Of Electronic Voting

Posted on:2012-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:P SuFull Text:PDF
GTID:2218330338971287Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, a new technology that is voting-electronic appeared. Electronic voting is electronic of a traditional voting, that is not only can save manpower and material resources, and convenient, flexible and secure, ensuring the interests of voters and the voting results of the fair. Thus, the e-voting become more popular, becoming the mainstream of developments in the field to vote. Study of electronic voting is a hot topic of scientific researchers, the concern by many researchers.This paper describes the development of e-voting process and application in the country, and the password associated with the electronic voting basic knowledge, and a lot more study secret sharing schemes, the use of cryptography, electronic voting is designed to satisfy three basic properties electronic voting scheme.The main results:1. By [33] introduce the electronic voting program of research,we could find dishonest tellers are free to change the content of ballot papers, and the dishonest tellers could combined to get the information, and make the election results dis-honest! In this paper, tellers can detect whether a simple and effective cheating methods.2. The electronic voting program, many programs are using "the trusted third party" to the tellers, but in real life, weather such a "the trusted third party" is there? This paper presents a roll call themselves by the voters of the electronic voting program. Avoid "the trusted third party" existing, greatly facilitate the electronic voting.3. In this paper, all of the electronic voting scheme the real tellers process, reliability, depth of research, but also put forward a solution, but the study found that in the process of electronic voting, many voters also appear to vote, or is the roll-call vote when the leakage phenomena. To address this issue, this paper presents an effective solution to vote!...
Keywords/Search Tags:cryptography, secret sharing scheme, electronic voting, anti-fraud, self-tellers
PDF Full Text Request
Related items