E-voting scheme using secret sharing and K-anonymity

被引:1
|
作者
Yining Liu
Quanyu Zhao
机构
[1] Guilin University of Electronic Technology,Guangxi Key Laboratory of Trusted Software
[2] Guizhou University,Guizhou Provincial Key Laboratory of Public Big data
来源
World Wide Web | 2019年 / 22卷
关键词
E-voting; Secret sharing; K-anonymity; Coercion-resistance; Unconditional security;
D O I
暂无
中图分类号
学科分类号
摘要
E-voting maybe replaces the traditional voting scheme in the future, however, the security threat must be paid enough attention. In this paper, a novel e-voting scheme is proposed using secret sharing and k-anonymity, which not only satisfies the basic security goals such as the non-cheating, the universal verifiability, the confidentiality, and the anonymity, but also achieves the addition properties including coercion-resistance and unconditional security since the security of the proposed scheme does not rely on any computational hard problem.
引用
收藏
页码:1657 / 1667
页数:10
相关论文
共 50 条
  • [1] E-voting scheme using secret sharing and K-anonymity
    Liu, Yining
    Zhao, Quanyu
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 22 (04): : 1657 - 1667
  • [2] E-Voting Scheme Using Secret Sharing and K-Anonymity
    Zhao, Quanyu
    Liu, Yining
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 893 - 900
  • [3] A Verifiable E-voting Scheme with Secret Sharing
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Hu, Weitong
    Tan, Xing
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 304 - 308
  • [4] Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
    Foerster, David
    Loehr, Hans
    Kargl, Frank
    [J]. 2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 279 - 286
  • [5] A weighted E-voting scheme with secret weights
    Zhong Hong
    Huang Liusheng
    Xiong Yan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (03) : 413 - 416
  • [6] Distributed Remote E-Voting System Based on Shamir's Secret Sharing Scheme
    Tejedor-Romero, Marino
    Orden, David
    Marsa-Maestre, Ivan
    Junquera-Sanchez, Javier
    Gimenez-Guzman, Jose Manuel
    [J]. ELECTRONICS, 2021, 10 (24)
  • [7] BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness
    Lu, Ning
    Xu, Xin
    Choi, Chang
    Fei, Tianlong
    Shi, Wenbo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing
    Li, Jing
    Wang, Xianmin
    Huang, Zhengan
    Wang, Licheng
    Xiang, Yang
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 91 - 97
  • [9] Preserving Anonymity in E-Voting System Using Voter Non-Repudiation Oriented Scheme
    Hamid, Isredza Rahmi A.
    Radzi, Siti Nafishah Md
    Ab Rahman, Nurul Hidayah
    Chuah Chai Wen
    Abdullah, Nurul Azma
    [J]. 2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST'17), 2017, 1891
  • [10] A Hybrid E-Voting Scheme
    Peng, Kun
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 195 - 206