1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we propose an e-voting system with a ballot-cancellation property. The existed voting systems had overlooked about the ballot-cancellation scheme. There is the reason that the ballot is cancelled according to an election law. For example, when a right of casting the ballot is Election Day, the ballot-cancellation scheme is needed for an absentee voter. Usually, the absentee voter casts a ballot before Election Day. If the absentee voters which cast a ballot die or lost the right of casting the ballot before Election day, the ballots of absentee voters should be cancelled according to the election law. When the ballot is cancelled, the ballot-cancellation scheme should satisfy privacy and verifiability. Cramer et al. proposed a very efficient multi-authority election schemes which guarantee privacy, robustness, and universal verifiability at Eurocrypt'97. Yamaguchi et al. pointed out that the e-voting system based on multi-party has much computing resources, and proposed the two-centered e-voting protocol based on r-th residue encryption and RSA cryptosystem. However, their system is just yes-no voting. First, we propose a 1-out-of-L e-voting based on Yamaguchi et al.'s scheme. Second, we extend this 1-out-of-L e-voting to the ballot-cancellation scheme.
- 一般社団法人情報処理学会の論文
- 2005-07-21
著者
-
Sakurai Kouichi
Faculty Of Information Science And Electrical Engineering Kyushu University
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
HER Yong
Graduate School of Information Science and Electrical Engineering, Kyushu University
-
IMAMOTO Kenji
Graduate School of Information Science and Electrical Engineering, Kyushu University
-
Her Yong
Department Of Computer Science And Communication Engineering Graduate School Of Information Science
-
Her Yong
Graduate School Of Information Science And Electrical Engineering Kyushu University
-
Imamoto Kenji
Graduate School Of Information Science And Electrical Engineering Kyushu University
-
Sakurai Kouichi
Faculty Of Computer Science And Communication Engineering Kyushu University
-
Imamoto Kenji
Department Of Computer Science And Communication Engineering Graduate School Of Information Science
-
Her Yong-Sork
Graduate School of Information Science and Electrical Engineering, Kyushu University
関連論文
- A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment(Application)(Cryptography and Information Security)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider(Network Security)
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis
- Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Private Data Clustering based on Secure Approximation
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- Analysis and Design of SHA-V and RIPEMD-V with Variable Output-Length
- Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems(Side Channel Analysis, Cryptography and Information Security)
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider