Secure electronic voting using Publicly Verifiable Secret Sharing scheme

被引:0
|
作者
Song, Chun-lai [1 ]
Yin, Xin-chun [1 ]
机构
[1] Yangzhou Univ, Inst Informat Technol, Yangzhou 225009, Peoples R China
关键词
electronic voting; publicly verifiable secret sharing; proof of knowledge common exponent;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A robust and secure electronic voting scheme is proposed by using Publicly Verifiable Secret Sharing and Proof of knowledge of Common Exponent. And the emphasis is put on the discussion how to resist outsider attack and insider attack in Internet complex network environment. Our scheme call solve such problems as "vote lost", "vote delay" and "dishonest counter" etc.
引用
收藏
页码:627 / 630
页数:4
相关论文
共 50 条
  • [21] A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
    Zaghian, Ali
    Bagherpour, Bagher
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (02): : 91 - 99
  • [22] Publicly verifiable secret sharing technology in blockchain
    He, Miao
    Bai, Fen-Hua
    Yu, Zhuo
    Shen, Tao
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (02): : 306 - 312
  • [23] Publicly verifiable secret sharing with enrollment ability
    Yu, Jia
    Kong, Fanyu
    Hao, Rong
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 194 - +
  • [24] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    [J]. IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [25] Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets
    Ogata, Wakaha
    Araki, Toshinori
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 103 - 114
  • [26] An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    Wu, Zhihan
    Du, Hongjiang
    [J]. International Journal of Network Security, 2021, 23 (01) : 97 - 105
  • [27] Verifiable Secret Sharing Scheme on Images using Watermarking
    Roy, Chitradeep Dutta
    Choudhury, Neel
    Chatterjee, Amrik
    Adhikari, Avishek
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 76 - 81
  • [28] Verifiable Secret Sharing Scheme Using Hash Values
    Imai, Junta
    Mimura, Mamoru
    Tanaka, Hidema
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
  • [29] Publicly verifiable secret sharing scheme and its application with almost optimal information rate
    Peng, Qiao
    Tian, Youliang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6227 - 6238
  • [30] Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation
    Chen, Xin
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4609 - 4624