An Electronic Voting Protocol Preserving Voter's Privacy(Applications of Information Security Techniques)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper we present a new, two-centered electronic voting scheme that is capable of preserving privacy, universal verifiability, and robustness. An interesting property of our scheme is the use of double encryption with additive homomorphic encryption functions. In the two-centered scheme, the first center decrypts the ballots, checks the eligibility of the voters, and multiplies each eligible vote, which is still encrypted in the cryptosystem of the second center. After deadline is reached, the second center obtains the final tally by decrypting the accumulated votes. As such, both centers cannot know the content of any individual vote, as each vote is hidden the accumulated result, therefore the privacy of the voters is preserved. Our protocols, together with some existing protocols, allow everyone to verify that all valid votes are correctly counted. We apply the r-th residue cryptosystem as the homomorphic encryption function. Although decryption in the r-th residue cryptosystem requires an exhaustive search for all possible values, based on experiments we show that it is possible to achieve desirable performance for large-scale elections.
- 社団法人電子情報通信学会の論文
- 2003-09-01
著者
-
KUROSAWA Kaoru
Ibaraki University
-
Tsujii Shigeo
Chuo University
-
Tsujii Shigeo
Chuo Univ. Tokyo Jpn
-
Kurosawa Kaoru
Ibaraki Univ. Hitachi‐shi Jpn
-
YAMAGUCHI Hiroshi
NEC Soft, Ltd.
-
KITAZAWA Atsushi
NEC Soft, Ltd.
-
DOI Hiroshi
RDI. Chuo University
-
Kitazawa Atsushi
Nec Soft Ltd.
-
Yamaguchi Hiroshi
Nec Soft Ltd.
関連論文
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
- Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
- Tag-KEM from Set Partial Domain One-Way Permutations
- Small Secret Key Attack on a Takagi's Variant of RSA
- Security of the Five-Round KASUMI Type Permutation
- Between Hashed DH and Computational DH : Compact Encryption from Weaker Assumption
- How to Construct Super-Pseudorandom Permutations with Short Keys(Symmetric Cryptography,Cryptography and Information Security)
- An Electronic Voting Protocol Preserving Voter's Privacy(Applications of Information Security Techniques)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
- Undeniable and Unpretendable Signatures