Font Size: a A A

Research Of Several Electronic Voting Schemes

Posted on:2013-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:H YuanFull Text:PDF
GTID:2218330374967081Subject:System theory
Abstract/Summary:PDF Full Text Request
It is the development trend that electronic voting system will replace paper voting system. Every electronic voting system has its own features。This paper mainly researches electronic voting system, uses the principle of cryptography to analyze and design several different voting systems.The main research results of this paper are as follows:Study an electronic voting system based on mix-net, which is proposed recently. Find the weakness of this system, give the proof of its weakness and the way of attack. According to the research of electronic voting system based on homomorphic encryption and blind signature, this paper uses the techniques of anonymous channel, threshold Pallier cryptosystem, blind signature and non-interactive zero-knowledge argument to design a homomorphic tallying system based on anonymous channel, and makes a contrast with other related voting systems. This system satisfies the basic properties of electronic voting system, meets the properties of verifiable and receipt-free at the same time. The mix-net based electronic voting system mentioned in our paper doesn't have this property. The new system maintains computational complexity of the mix-net based system.Study a verifiable electronic voting system based on pre-encrypted ballots, analyze the security of this system and find many insecurity factors. To fix the insecurity flaws, this paper proposes a new system. The new system reorganizes the too much powerful authority and adds a private key which can be recovered with the help of several authorities. After analyzing the properties of the new voting system and contrasting with the original system, this paper finds that the new system can resolve problems of the original system, such as the power of ballot distribution authority is too much, the voter's privacy can't be well protected, the modification of tallying result made by the tallying authority can't be found.
Keywords/Search Tags:electronic voting, mix-net based, anonymous channel, homomorphicencryption, threshold Pallier encryption, pre-encryption
PDF Full Text Request
Related items