Font Size: a A A

Research On Proxy Electronic Voting Protocol

Posted on:2012-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:E F BaiFull Text:PDF
GTID:2218330362453025Subject:Traffic Information Engineering & Control
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and network technology, electronic voting is widely used. Compared with the traditional manual voting, electronic voting not only can save manpower and material resources, but also can be more convenient, flexible and secure. It can guarantee the interest of the voters and the fairness of the voting results better. In the existing literatures on electronic voting developed over the past years, the voting is carried out by voters themselves, and the research on proxy voting is extremely rare. In this paper, we research into this issue and mainly work on the points as below.Firstly, the cryptography technology involved in electronic voting was introduced, and then the classification of the existing electronic voting protocols was given. Finally, the proxy electronic voting protocols were studied.1. Existing electronic voting protocols and proxy electronic voting protocols were studied. Based on how voters submit votes to the tallying authority, existing electronic voting protocols were divided into three categories: hidden voter, hidden vote and hidden voter with hidden vote, and comparison between the classes was proposed. Performance requirement of proxy electronic voting protocol was analyzed, and according to different proxy entity, classification of proxy electronic voting protocol was given,2. The security of a protocol commonly known as the FOO protocol was emphatically analyzed, and the main defects were pointed out: disclaiming problem, vote collision, etc. In order to resolve the limitations of FOO protocol, an improved partial trust proxy electronic voting protocol was proposed. The improved protocol not only overcomes the security faults of FOO protocol but also gives a proxy voting mechanism in which the original voter can entrust a proxy voter to vote instead of himself.3. Privacy protection proxy electronic voting protocol was introduced. The vote is completely not visible to the proxy voter, which is different to the above protocol. Our proposed protocol adopts Diffie-Hellman key agreement protocol instead of the public-key cryptosystem, which is considered to be less time-consuming to keep information secret. Besides, a proxy server is applied to replace the network address of a ballot by another address such that anybody cannot find the connection between a ballot and the network address of the corresponding voter. What is more, the voter only needs to take a little time to perform the voting procedure, and most of the computation operations are performed by MC and VC. In addition, both MC and VC will count all votes to have the voting result doubly checked such that miscounting votes will be eliminated. The final security and efficiency analysis show that the proposed voting mechanism not only achieves all essential requirements but also has better performance than other related works. As a result, our proposed electronic voting mechanism can be practically applied over the Internet.4. Partial trust proxy electronic voting protocol was modeled in the applied pi calculus, and the privacy of the protocol was formalized. The automatic tool ProVerif is unable to prove privacy derectly, because its ability to prove observational equivalence between processes is not complete. The article finally provides a manual proof of the required equivalence.
Keywords/Search Tags:proxy voting, security requirement, cryptographic protocol, formal analysis
PDF Full Text Request
Related items