A secure voting system on a public network

نویسندگان

  • Chin-Chen Chang
  • Wen-Bin Wu
چکیده

We point out that the encryption process of [1, 2] is not invertible. This becomes evident through the following, illustrative, example. In accordance with Chang and Wu’s [1] protocol, let us assume that there are n eligible voters U1, . . . , Un, participating in the election. Further assume that the Voting Center chooses a prime number P, for example P 31, and a primitive element e 7 over GF(31), and publicizes them. Based on the above assumptions we describe the voting phase. The purpose of this phase is to support the casting of votes and the secure encryption and decryption of ballots. Assume that the Voting Center’s {private, public} key pair is ( x0, y0) (5, 5). Let the Voter’s voting strategy be Vi 6. In accordance with the Chang and Wu protocol, the following steps have to be performed:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols

Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum’s work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make especially if the mail system cannot be tr...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

I&s Improved Anonymous Secure E-voting over a Network

In a democratic country voting is one of the most important activities. However, many eligible voters do not exercise their right simply because they do not want to visit a public booth where they can vote. In 1981, David Chaum first introduced the concept of electronic voting and attempted to overcome the problems associated with the traditional voting environment. Hereafter, Mu and Varadharaj...

متن کامل

Secure Internet Voting on Limited Devices with Anonymized DSA Public Keys

This paper presents an Internet voting protocol, which is primarily designed for limited voting devices such as smart cards or mobile phones. The minimum requirement for these devices is the ability to compute one ElGamal encryption and one DSA signature in reasonable time. The protocol is based on an anonymization mechanism for DSA public keys, which can be installed on top of an existing DSA ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Networks

دوره 43  شماره 

صفحات  -

تاریخ انتشار 1997