Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

被引:3
作者
Chiou, Shin-Yan [1 ,2 ,3 ]
Wang, Tsung-Ju [1 ]
Chen, Jiun-Ming [1 ]
机构
[1] Chang Gung Univ, Dept Elect Engn, Coll Engn, 259 Wen Hwa 1st Rd, Taoyuan, Taiwan
[2] Linkou Chang Gung Mem Hosp, Dept Nucl Med, Taoyuan, Taiwan
[3] Chang Gung Univ, Ctr Biomed Engn, Taoyuan, Taiwan
关键词
PATTERNS;
D O I
10.1155/2017/3075210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server). We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.
引用
收藏
页数:16
相关论文
共 39 条
[1]  
Adida B., 2008, USENIX, P335
[2]   E-voting in Jordan: Assessing readiness and developing a system [J].
Aljarrah, Emran ;
Elrehail, Hamzah ;
Aababneh, Bashar .
COMPUTERS IN HUMAN BEHAVIOR, 2016, 63 :860-867
[3]   e-voting requirements and implementation [J].
Anane, Rachid ;
Freeland, Richard ;
Theodoropoulos, Georgios .
9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, :382-+
[4]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[5]  
[Anonymous], 2000, P INT C CHIN LANG CO
[6]  
[Anonymous], 2002, MM RES PREPR
[7]   Modeling energy-efficient secure communications in multi-mode wireless mobile devices [J].
Castiglione, Arcangelo ;
Palmieri, Francesco ;
Fiore, Ugo ;
Castiglione, Aniello ;
De Santis, Alfredo .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) :1464-1478
[8]  
Chaum D., 1983, CRYPTO, V82
[9]  
Chiou S.-Y., 2016, WIREL NETW, P1
[10]   Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment [J].
Chiou, Shin-Yan ;
Ying, Zhaoqin ;
Liu, Junqiang .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (04) :1-15