Font Size: a A A

Design And Implementation Of A Highly Secure Electronic Voting System

Posted on:2015-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:P R ShiFull Text:PDF
GTID:2308330473953502Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the growing maturity of the technology of the Internet, scholars developed the electronic vote in new elections. Electronic voting was implemented on Internet election, than previous manual voting, electronic voting relies on computer terminals and Internet technology, which effectively avoid manual error, thereby guaranteeing the voting result of the objective truth. Opening this article set out the current electronic ballot design programmes such as R.Cramer(written for the CGS programme), design programmes such as Chen Zhiyang(credited as CZ programme), and Civitas programme.However, there are certain problems and deficiencies in these programs. To solve these problems,this system combines the electronic bulletin board technology mentioned by Civitas program and CGS program, learn the only smart card ID signs by CZ program,reduce the rely on central institutions and trusted third parties. Specific activities include the following:First of all, based on CGS scheme, also with the ideas of CZ scheme and Civitas scheme, combine the knowledge with undergraduate,we designed an efficient and secure electronic voting scheme. Compared with other programs, the program is more simple, while meeting the basic characteristics of the electronic voting system.Secondly, the system mentioned in this article apply user registration to solve the problem of anonymous voting, bind IP address to approach to the problem of anti-abuse, by using electronic bulletin board approach to solve the authentication problem, meanwhile, using the HASH function to hash the user’s password to protect the information displayed on the electronic bulletin board is only visible.Finally, CGS program is based entirely credible communication channel; CZ program is based on trusted third party. However, in a network environment, completely trusted third party is almost impossible to achieve. This system is designed using the unique ID mark. Thus, the program mentioned in this article reduce the system requirements for trusted third parties, makes it even more simple.
Keywords/Search Tags:Electronic Voting, Zero-knowledge Proof, Eletronic Voting, Trusted Third Party
PDF Full Text Request
Related items