Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

被引:26
作者
Li, Jing [1 ,2 ]
Wang, Xianmin [1 ]
Huang, Zhengan [1 ]
Wang, Licheng [2 ]
Xiang, Yang [3 ,4 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Shaanxi, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Multi-secret sharing; Multi-role e-voting; Decentralized system; Cloud computing; EFFICIENT;
D O I
10.1016/j.jpdc.2019.04.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The cryptosystem-based data privacy preserving methods employ high computing power of cloud servers, where the main feature is to allow resource sharing and provide multi-user independent services. Therefore, to achieve the rapid allocation and release of resource sharing in cloud computing, decentralized cryptographic protocols need to be proposed for multi-user consensus systems. In this work, we first present a multi-secret sharing scheme with multi-level access structure, where the secret reconstruction algorithm satisfies the additive homomorphism. The secret sharing scheme needs no trusted third parties and any user can play the role of dealer. In the designing, multiple target secrets are independently shared, where each subset of users forms a sub-access structure and shares one target secret only with a short secret share. This scheme is efficient and unconditionally secure. Furthermore, based on the multi-level access structures, a decentralized multi-role e-voting protocol is designed using Chinese Remainder Theorem, where each role's election is associated with one sub-access structure. The voters employ a shared parameter to blind the sum of ballot values. Meanwhile, the e-voting scheme supports a public verification for the final election results. Compared with the existing e-voting protocols, our e-voting system does not require any authority center and the cloud server runs vote counting. And our e-voting scheme does not need any high-complexity computational cost operation such as module exponential operation, etc. Finally, the common feature of Blockchain and Ad Hoc networks is decentralized. Thus the main idea of this protocol without a trusted third party can be used to achieve a secure consensus among multiple nodes in Blockchain and Ad Hoc network, meanwhile, the consensus results can be verified. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:91 / 97
页数:7
相关论文
共 33 条
  • [1] Ambrosin M., 2017, ODIN OBFUSCATION BAS
  • [2] [Anonymous], 2008, INT J CONT MATH SCI, DOI DOI 10.1109/ICACT.2007.358655
  • [3] [Anonymous], 1964, The Mathematical Theory of Communication
  • [4] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
  • [5] BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
  • [6] Brickell E.F., 1990, LNCS, V434, P468, DOI [10.1007/3-540-46885-4_45, DOI 10.1007/3-540-46885-4_45, 10.1007/3-540-46885-445, DOI 10.1007/3-540-46885-445]
  • [7] An efficient multi-use multi-secret sharing scheme based on hash function
    Das, Angsuman
    Adhikari, Avishek
    [J]. APPLIED MATHEMATICS LETTERS, 2010, 23 (09) : 993 - 996
  • [8] Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (09) : 1777 - 1784
  • [9] Dehkordi MH, 2008, INFORM SCIENCES, V178, P2262, DOI 10.1016/j.ins.2007.11.031
  • [10] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190