Anonymous quantum voting protocol based on Chinese remainder theorem

被引:12
|
作者
Shi, Run-hua [1 ,2 ]
Qin, Jia-qi [3 ]
Liu, Bai [1 ]
Zhang, Mingwu [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
[2] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[3] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
来源
EUROPEAN PHYSICAL JOURNAL D | 2021年 / 75卷 / 01期
基金
中国国家自然科学基金;
关键词
Chinese remainder theorem - Entangled state - Entanglement state - Protocol cans - Security requirements - Verifiability - Voting protocols;
D O I
10.1140/epjd/s10053-020-00014-2
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Electronic voting is an essential tool in modern society. In this paper, we investigate anonymous quantum voting for the travelling ballot. At present, there exist some anonymous quantum travelling ballot protocols, but these protocols are not practical because of the lack of non-reusability or verifiability. Based on Chinese Remainder Theorem, an anonymous quantum voting protocol of the travelling ballot is proposed with an entanglement state, where the partial qubits of the entangled state as the quantum ballot are sent to each voter one-by-one and the other as the corresponding quantum certificate to the tallyman. The proposed protocol can not only ensure non-reusability but also can verify the correctness of the votes.Graphic Abstract(1) Define phase operators as voting operators based on Chinese Remainder Theorem; (2) Present an anonymous quantum voting protocol for the travelling ballot; (3) Meet more security requirements, e.g., verifiability, non-reusability and anonymity.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Multi-owner RFID Tag Ownership Transfer Protocol based on the Chinese Remainder Theorem
    Gan, Yong
    Xu, YunQian
    He, Lei
    Xue, Feng
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (11): : 199 - 207
  • [32] An anonymous voting mechanism based on the key exchange protocol
    Chang, Chin-Chen
    Lee, Jung-San
    COMPUTERS & SECURITY, 2006, 25 (04) : 307 - 314
  • [33] Multivariable Chinese Remainder Theorem
    Sury, B.
    RESONANCE-JOURNAL OF SCIENCE EDUCATION, 2015, 20 (03): : 206 - 216
  • [34] Generalization of the Chinese remainder theorem
    Davydova I.M.
    Fedoseeva E.Y.
    Vestnik St. Petersburg University: Mathematics, 2007, 40 (3) : 209 - 217
  • [35] CONVOLUTION ALGORITHMS, BASED ON THE CRT (CHINESE REMAINDER THEOREM)
    MARTENS, JB
    SIGNAL PROCESSING, 1984, 6 (04) : 279 - 292
  • [36] Weighted secret sharing based on the chinese remainder theorem
    Harn, Lein
    Fuyou, Miao
    International Journal of Network Security, 2014, 16 (06) : 420 - 426
  • [37] Families of traceability codes based on the Chinese Remainder Theorem
    Cotrina, Josep
    Fernandez, Marcel
    Casademont, Jordi
    2006 IEEE INFORMATION THEORY WORKSHOP, 2006, : 121 - +
  • [38] The Generalization of the Chinese Remainder Theorem
    Li Rong Yu
    Li Bo Luo
    Acta Mathematica Sinica, 2002, 18 : 531 - 538
  • [39] A Chinese Remainder Theorem for partitions
    Kayanattath Seethalakshmi
    Steven Spallone
    The Ramanujan Journal, 2023, 61 : 989 - 1019
  • [40] CHINESE REMAINDER THEOREM APPLIED
    LOSSERS, OP
    BUISSANTDESAMORIE, EC
    BEIDLER, J
    BREUSCH, R
    BUDE, PD
    MIGUEL, JLD
    DEUERMAN, DR
    ELSNER, T
    FOSTER, L
    GERST, I
    GREENING, MG
    GRINSTEIN, L
    GROENEWOUD, C
    HARNADEK, A
    HASKELL, CT
    HEUER, GA
    ISAACSON, E
    JOHNSON, A
    KOCH, RJ
    KUIPERS, L
    LEW, J
    LOCKHART, D
    LORD, G
    MACDONALD, C
    MARKEL, W
    MARTIN, B
    MCCUISTON, R
    NELSEN, R
    PENNEY, D
    REID, L
    RUDERMAN, H
    SABHARWAL, CL
    SARDINAS, A
    SKALSKY, M
    VANDERVAART, HR
    VALK, G
    VOWE, M
    WEXLER, C
    WILD, W
    YIU, YH
    AMERICAN MATHEMATICAL MONTHLY, 1978, 85 (02): : 119 - 121