| With the advancement of science and technology and the deepening of democratic thought,voting has become more and more commonplace in daily life as an expression of people's wishes and aspirations.Compared with the traditional voting model,electronic voting is more convenient,fast and environmentally friendly.In order for the entire voting campaign to proceed smoothly and the voting results to be credible,we must first design a voting protocol theoretically and prove that the protocol has a series of attributes required by voting activities,such as: anonymity,verifiability,robustness,and so on.Due to the rapid development of cryptographic technology,there are various voting protocols for different scenarios and security assumptions.These protocols have more or less defects,some of them in order to verify the validity of ballots,a large number of zero-knowledge proofs have been introduced,resulting in its inefficiency.Some others of them assume that there is a trustworthy management organization and so on to ensure the robustness of the voting process.Therefore,how to design a safe and efficient voting protocol and prove it theoretically is an important issue in the current security field.This article focuses on this issue and the main contributions are as below.(1)First,we briefly introduced the cryptography-related technologies involved in the voting protocol,analyzed the defects and deficiencies of the currently existing voting protocols,and pointed out that the fact that in order to resolve the robustness of the voting process,most of current voting protocols assume that there is a trusted management organization.(2)Based on ElGamal threshold cryptosystem and various cryptographic techniques,a new voting protocol was proposed for this problem.It used mutual agreement between voting participants and managers to restrict the fraud behavior of the managers.Trusted third parties were removed and the voting process was streamlined.It adopted homomorphic encryption and introduced the cloud-counting model to improve the efficiency of counting votes.A security analysis of the protocol attributes was also provided.(3)Based on the new protocol,a secure electronic voting system was designed and implemented based on the Android platform.An analysis of the main functional modules of the mobile client was also given. |