Font Size: a A A

Research Of E-Voting Protocol Based On Proxy Blind Signature

Posted on:2014-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:B J ZhangFull Text:PDF
GTID:2268330401981624Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the developing of our society, all countries and organizations are more and moredemocratic, many important events will take individual participation. The election willoccupy an important position in social life. There are a lot of problems in traditional election,for example, the voters must be gathered together in one place or to the designated place forthe election, this relates to the site, traffic, and many other aspects of resources, which cause alot of consumption, and count the votes finally is a huge project. More importantly, it is verydifficult to achieve fairness and justice. Now, the rapid development of computer technologyand communication technology, related researches in the field of cryptography, E-voting as anew way of election can better reflect its value.This paper mainly studies the privacy protection about votes and No receipts of E-voting.Protect content of vote is the premise of guarantee fairly election, because of this, voters canelect anonymous, and voters can elect according to their willingness. No receipts is to ensurethat candidates can not bribe or force voters so as to affect the election results, undermine thefair of election. Only to do the two basic points, We can achieve democracy, the election alsomakes sense. The paper proposes an E-Voting protocol based on proxy blind signature.Results of this study are as follows:1、Research the digital signature, analysis of some properties of the digital signature; itcan protect transmission or storage of network information. Focus on proxy signature andblind signature, and introduce several kinds of typical protocols of proxy signature and blindsignature, analysis and comparison of safety goals.2、We research mainly the security objectives of electronic voting and the existingelectronic voting protocol type and comparison. Security objectives is an important evaluationstandard for electronic voting scheme and electronic voting system is feasible or not. It is alsoour first reference basis for designing electronic voting scheme. According to the present of alarge number of electronic voting protocol, through sum up, they can be divided into the mainfour types, respectively: electronic voting protocol based on blind signature, electronic votingprotocol based on secret sharing, electronic voting protocol based on mixing network,electronic voting protocol based on homomorphic encryption. We give the analysis andcomparison of four types of electronic voting scheme.3、We further research E-voting schemes based on proxy signature and blind signatureat home and abroad. Analysis the safety requirements in the electoral process, improvedsecurity threats still exist at present. We analysis the security vulnerabilities in E-votingschemes based on improved discrete logarithm problem. A method of attack is given,improve the part of proxy authorization and blind signature, and propose a more efficient and safer E-voting scheme based on proxy blind signature. In this scheme, according to the largescale election, voter registration, the signature of votes and the finally counting process isvery time-consuming. We set up agency in different region, for example, set a province as aproxy, does the election parallel at the same time. Blind signature is used to ensure voters’privacy protection, blind the votes, protect the privacy of voters, and more efficient. Forhigher requirements in E-voting, which is universal verifiability and No receipts, to achieve arelative balance between the two requirements, which improve the operability and impartiality.Because the blind factors in blind signature can be used to conceal the content of votes, at thesame time, it also is taken as evidence by a voter, asking bribes to a candidate. So thecounting stage in this scheme use the ElGamal homomorphism encryption, ensure the Noreceipts in E-voting, it can prevent bribe, and compulsory voting.
Keywords/Search Tags:E-voting, Proxy Signature, Blind Signature, Receipt-freeness, HomomorphismEncryption
PDF Full Text Request
Related items