Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/52778
|
Title: | 基於模糊簽章之電子投票系統 An e-voting system based on oblivious signatures |
Authors: | 陳淵順 Chen, Yuan Shun |
Contributors: | 左瑞麟 Tso, Lay Lin 陳淵順 Chen, Yuan Shun |
Keywords: | 盲簽章 密碼學 電子投票 資訊安全 模糊簽章 Blind Signature Cryptography Electronic Voting Information Security Oblivious Signatures |
Date: | 2010 |
Issue Date: | 2012-04-17 09:16:55 (UTC+8) |
Abstract: | 近期電子投票系統被廣泛討論,許多國家也開始實行電子投票系統來取代傳統紙本投票。而一套完整的電子投票系統欲取代傳統紙本投票,此系統就必須滿足傳統紙本投票的需求,有完善的機制用以保護投票者在進行投票時的隱私性,保證投票者的身分及選票內容不被其他人得知,並維持整個投票過程的完整性、可驗證性及公平性等等的需求,系統的穩定性也是必須要考量的因素。 本篇論文主要針對投票者的隱私性及如何減輕投票者的負擔進行討論,我們提出了參考愛沙尼亞國家的電子投票系統的優點做結合,設計出一個改良的基於模糊簽章的電子投票系統。 Electronic voting systems have been widely investigated in recent years since they are very convenient for voters. Many countries have begun to implement electronic voting system to replace the traditional voting system. In order to replace the traditional voting system, an e-voting system must satisfy all the security requirements of those in a traditional voting system. Those security requirements are, firstly, to have a sound mechanism to protect a voter’s privacy, and to ensure that the identity of a voter or the content of a ballot will not be leaked to others. Moreover, it must maintain the integrity, verifiability and fairness during the entire voting process. To keep the system stable during the voting process is also an important factor that must be considered.
This thesis is a research on designing a secure electronic voting system. Based on some existing electronic voting systems, we design an improved system to enhance the privacy protection of voters on one hand and to reduce the loading of voters on the other hand. In detail, our scheme is modified from the existing e-voting system of Estonian state, and we proposed an improved e-voting system which uses the oblivious signatures as a building block. |
Reference: | [1] O. Cetinkaya, A. Doganaksoy. “Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols”. ARES`07, IEEE, 2007, pp. 1190-1196. [2] D. Chaum. “Blind signatures for Untraceable Payments”. Advances in Cryptology-Crypto’82. Plenum Press, 1983, pp. 199-203. [3] D. Chaum. “Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA”. Advances in Cryptology-EUROCRYPT’88, Springer-Verlag, 1989, pp. 177-182. [4] D. Chaum, E. van Heijst. “Group signatures”. IN: Davies, D.W.(ed.) EUROCRYPT 1991. Springer, LNCS, Vol. 547, 1991, pp. 257-265. [5] L. Chen. “Oblivious signatures”. IN: Gollmann, D.(ed.) ESORICS 1994. Springer, LNCS, Vol. 875, 1994, pp. 161-172. [6] W. Diffie and M.E. Hellman. “New Directions in Cryptography”. IEEE Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654. [7] T. ElGamal. “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”. CRYPTO ’84, Springer, LNCS, 1985, pp. 10-18. [8] J. Kim, K. Kim, and C. Lee. “An Efficient and Provably Secure Threshold Blind Signature”, ICICS2001, Springer, LNCS 2288, springer-verlag, Berlin Heidelberg, 2001, pp. 318-327. [9] Y-C. Lai. “A Study on Digital Blind Signature and Its Applications to Electronic Voting and Electronic Cash”, 2002, available at http://ethesys.lib.cyut.edu.tw/ ETD-db/ETD-search-c/view_etd?URN=etd-0715102-132859. [10] Y-H. Li, S-Y. Wu. “Research on a New E-voting Method based on the Cellular Phone”. ISECS2008, IEEE, 2008, pp.818-821. [11] C. H. Lim and P. J. Lee. “A key recovery attack on discrete log-based schemes using a prime order subgroup”. Springer, LNCS, CRYPTO ’97, 1998, pp. 249-263. [12] X. Lin, R. Lu, H. Zhu, P. Ho and X. Sherman. “Provably Secure Self-certified Partially Blind Signature Scheme from Bilinear Pairings”. ICC2008, 2008, pp. 1530-1535. [13] M. Mambo, K. Usuda, and E. Okamot. “Proxy signature: delegation of the power to sign messages”. IEICE Trans, Fundamentals, Vol. E79-A, NO.9, 1996, pp. 1338-1353. [14] D. Pointcheval. “Practical Security in Public-Key Cryptography”. Springer, LNCS, ICISC 2001, 2001, pp. 223-241. [15] C.P. Schnorr. “Efficient signature generation for smart cards”. Journal of Cryptology, 1991,4(3). pp. 161- 174. [16] A. Shamir. “How to Share a Secret”. Communications of ACM, vol.22, no.11, 1979, pp.612-613. [17] C. Song, X. Yin, Y. Liu. “A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme”. CIS2008, IEEE, 2008, pp. 381-384. [18] R. Tso, T. Okamoto and E. Okamoto. “1-out-of-n oblivious signatures”. In Proceedings of the 4th Information Security Practice and Experience Conference (ISPEC2008), Springer, LNCS Vol. 4991, 2008, pp. 45-55. [19] S. Wang, H. Fan, G. Cui. “A proxy blind signature schemes based DLP and applying in e-voting”. ICEC `05, ACM, 2005, pp. 641-645. [20] B-Y. Wang, F. Yang, Y-F. Hu. “Online Voting Scheme Based on Blind Digital Signature”. MINIMICRO SYSTEM, 2002(3), pp. 588- 591. [21] X. Yi, R. Tso. “Mobile Electronic Election Using Smart Cards”. Communications of the CCISA Vol. 16 No. 1, 2010, pp. 26-40. [22] http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf, “E-Voting System”, Tallinn 2005. [23] http://www.6law.idv.tw/6law/law/公職人員選舉罷免法.htm, “公職人員選舉罷免法”, 2010年修改。 [24] http://moica.nat.gov.tw/html/index.htm, “內政部憑證管理中心”。 [25] 王淳,NCKU電子投票系統之安全性分析,國立成功大學工學院工程管理碩士在職專班論文,2008年。 [26] 李秉禮,具選票驗證之匿名電子投票機制,佛光大學資訊學系碩士在職專班論文,2007年。 [27] 吳正義、楊吳泉、金明浩,選民可即時檢驗之電子投票系統設計,資通安全通訊專論,2010年。 [28] 范俊逸,抗暴力脅迫之匿名電子投票系統,國立中山大學資訊工程學系碩士論文,2006年。 [29] 莊文勝、吳靖琳,電子投票,資通安全分析專論,T94008,2005年。 |
Description: | 碩士 國立政治大學 資訊科學學系 97753036 99 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0977530361 |
Data Type: | thesis |
Appears in Collections: | [資訊科學系] 學位論文
|
Files in This Item:
File |
Size | Format | |
036101.pdf | 1196Kb | Adobe PDF2 | 1685 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|