Security Amplification of the Computer-Aided Voting System Using Quantum Cryptography Protocols

被引:0
作者
Karpinski, Mikolaj [1 ]
Gancarczyk, Tomasz [1 ]
Klos-Witkowska, Aleksandra [1 ]
Limar, Igor [2 ]
Vasiliu, Yevhen [3 ]
机构
[1] Univ Bielsko Biala, 2 Willowa St, PL-43309 Bielsko Biala, Poland
[2] Engn & Technol Inst Bioengn, 26 Mayakskaya Rd, UA-67667 Khlebodarskoye Village, Odessa Region, Ukraine
[3] Odessa Natl Acad Telecommun, 1 Kuznechna St, UA-65029 Odesa, Ukraine
来源
PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 1 | 2017年
关键词
computer-aided voting system; quantum bit commitment; quantum secret sharing; security amplification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptographic security scheme is proposed for a subsystem of the integrated computer-aided system that is intended for holding elections and counting the election returns. The main idea is to use two modern quantum cryptographic technologies: quantum bit commitment and quantum secret sharing. The scheme of information security of vote count procedure, and also the quantum bit commitment protocol and the quantum secret sharing protocol, are described. Using the protocols of quantum cryptography increases security of the computer-aided voting system on comparison with protocols of usual classical cryptography.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 7 条
[1]  
[Anonymous], 1999, LECT NOTES COMPUTER, DOI DOI 10.1007/3-540-48405-1_10
[2]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[3]  
Limar I., 2016, UKRAINIAN SCI J INFO, V22, P58
[4]   Experimental Bit Commitment Based on Quantum Communication and Special Relativity [J].
Lunghi, T. ;
Kaniewski, J. ;
Bussieres, F. ;
Houlmann, R. ;
Tomamichel, M. ;
Kent, A. ;
Gisin, N. ;
Wehner, S. ;
Zbinden, H. .
PHYSICAL REVIEW LETTERS, 2013, 111 (18)
[5]   On the implementation of a deterministic secure coding protocol using polarization entangled photons [J].
Ostermeyer, Martin ;
Walenta, Nino .
OPTICS COMMUNICATIONS, 2008, 281 (17) :4540-4544
[6]  
SMART N, 2002, CRYPTOGRAPHY INTRO
[7]   Efficient multiparty quantum-secret-sharing schemes [J].
Xiao, L ;
Long, GL ;
Deng, FG ;
Pan, JW .
PHYSICAL REVIEW A, 2004, 69 (05) :052307-1