Constructing credential-based E-voting systems from offline E-coin protocols

作者: Víctor Mateu , Francesc Sebé , Magda Valls

DOI: 10.1016/J.JNCA.2014.03.009

关键词:

摘要: Abstract Mu and Varadharajan proposed a remote voting paradigm in which participants receive blindly signed credential that permits them to cast vote anonymously. If some participant tries cheat by submitting more than one vote, her anonymity will be lifted. In the last years, several proposals following this paradigm, including Varadharajan׳s, have been shown cryptographically weak. paper we first show recent proposal Baseri et al. is also After that, give general construction employing an offline e-coin protocol as building block, provides anonymous system aforementioned paradigm.

参考文章(24)
Rasool Jalili, Mahdi Asadpour, Double Voting Problem of Some Anonymous E-Voting Schemes Journal of Information Science and Engineering. ,vol. 25, pp. 895- 906 ,(2009) , 10.6688/JISE.2009.25.3.15
Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto, An Improvement on a Practical Secret Voting Scheme Lecture Notes in Computer Science. pp. 225- 234 ,(1999) , 10.1007/3-540-47790-X_19
Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta, A Practical Secret Voting Scheme for Large Scale Elections theory and application of cryptographic techniques. pp. 244- 251 ,(1992) , 10.1007/3-540-57220-1_66
Aggelos Kiayias, Moti Yung, Self-tallying Elections and Perfect Ballot Secrecy public key cryptography. pp. 141- 158 ,(2002) , 10.1007/3-540-45664-3_10
Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee, Multiplicative Homomorphic E-Voting Progress in Cryptology - INDOCRYPT 2004. pp. 61- 72 ,(2004) , 10.1007/978-3-540-30556-9_6
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Wenbo Mao, Chae Hoon Lim, Cryptoanalysis in Prime Order Subgroups of Z*n international cryptology conference. pp. 214- 226 ,(1998) , 10.1007/3-540-49649-1_18
Stefan Brands, Untraceable off-line cash in wallet with observers international cryptology conference. pp. 302- 318 ,(1994) , 10.1007/3-540-48329-2_26
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Russ Housley, Public Key Infrastructure (PKI) The Internet Encyclopedia. ,(2004) , 10.1002/047148296X.TIE149