A multi-candidate electronic voting scheme based on secure sum protocol

被引:5
|
作者
Zhong, Hong [1 ,2 ,3 ]
Huang, Liusheng [1 ,3 ]
Luo, Yonglong [1 ,3 ]
机构
[1] Department of Computer Science and Technology, University of Science and Technology of China
[2] School of Computer Science and Technology, Anhui University
[3] National High Performance Computing Center at Hefei
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2006年 / 43卷 / 08期
关键词
Electronic voting; Multi-precision arithmetic; Secure sum;
D O I
10.1360/crad20060814
中图分类号
学科分类号
摘要
Multi-candidate electronic voting is very useful in numerous practical situations. Most of the previous schemes discuss Boolean vote in which voters can only cast 'yes/no' vote. A novel multi-candidates election scheme is presented which is appropriate for k-out-of-m election. The main idea is to express a ballot by a multi-precision number that allows voting for up to k out of the m candidates in one ballot. The purpose of the vote is to elect more than one winner among m candidates. The self-tallying protocol in the solution is based on the multi-precision arithmetic and the secure sum protocol without any trusted third party. In comparison with general methods, the results of this paper don't rely on any traditional cryptography or computation intractability assumption that is information-theoretically secure. This scheme achieves security including perfect ballot secrecy, receipt-free and dispute-freeness tally that extend the previous general security. Each participant takes only O(nm(log2n)) bit operations, which is more efficient than previous schemes. The scheme is very practical and can be efficiently implemented.
引用
收藏
页码:1405 / 1410
页数:5
相关论文
共 13 条
  • [1] Benaloh J., Tuinstra D., Receipt-free secret-ballot elections, Proc of the 26th ACM Symposium on Theory of Computing, pp. 544-553, (1994)
  • [2] Groth J., Efficient maximal privacy in boardroom voting and anonymous broadcast, Proc of the 8th Int'l Conf on Financial Cryptography (FC2004), LNCS 3110, pp. 90-104, (2004)
  • [3] Cramer R., Franklin M., Schoenmakers B., Multi-authority secret-ballot elections with linear work, Advances in Cryptology-Eurocrypt'96, LNCS 1070, pp. 72-83, (1996)
  • [4] Cramer R., Gennaro R., Schoenmakers B., A secure and optimally efficient multi-authority election scheme, Advances in Cryptology-Eurocrypt'97, LNCS 1223, pp. 103-118, (1997)
  • [5] Damgard I., Jurik M., A generalisation, a simplication and some applications of Paillier's probabilistic public-key system, The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001), LNCS 1992, pp. 119-136, (2001)
  • [6] Goldreich O., Secure multi-party computation (working draft), (1998)
  • [7] Rosen K.H., Elementary Number Theory and Its Applications, (1984)
  • [8] Cohen H., A Course in Computational Algebraic Number Theory, (1993)
  • [9] Knuth D.E., The Art of Computer Programming: Semi-Numerical Algorithms, (1981)
  • [10] Benaloh J.C., Secret sharing homomorphisms: Keeping shares of a secret secret, Advances in Cryptology-Crypto'86, LNCS 263, pp. 251-260, (1986)