E-voting scheme using secret sharing and K-anonymity

被引:1
|
作者
Yining Liu
Quanyu Zhao
机构
[1] Guilin University of Electronic Technology,Guangxi Key Laboratory of Trusted Software
[2] Guizhou University,Guizhou Provincial Key Laboratory of Public Big data
来源
World Wide Web | 2019年 / 22卷
关键词
E-voting; Secret sharing; K-anonymity; Coercion-resistance; Unconditional security;
D O I
暂无
中图分类号
学科分类号
摘要
E-voting maybe replaces the traditional voting scheme in the future, however, the security threat must be paid enough attention. In this paper, a novel e-voting scheme is proposed using secret sharing and k-anonymity, which not only satisfies the basic security goals such as the non-cheating, the universal verifiability, the confidentiality, and the anonymity, but also achieves the addition properties including coercion-resistance and unconditional security since the security of the proposed scheme does not rely on any computational hard problem.
引用
收藏
页码:1657 / 1667
页数:10
相关论文
共 50 条
  • [41] Enhanced k-anonymity Privacy Protection Scheme in Continuous LBS Queries
    Wang, Wei
    Zhao, Wen-Hong
    Cheng, Zhong
    Li, Xing-Hua
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 289 - 293
  • [42] Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
    Zhou, Kexin
    Wang, Jian
    [J]. 2019 20TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2019,
  • [43] Investigation on Privacy Preserving using K-Anonymity Techniques
    Kumar, B. Santhosh
    Daniya, T.
    Sathya, N.
    Cristin, R.
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 318 - 324
  • [44] k-Anonymity on Graphs Using the Szemerdi Regularity Lemma
    Minello, Giorgia
    Rossi, Luca
    Torsello, Andrea
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1283 - 1292
  • [45] A Semantic-Based K-Anonymity Scheme for Health Record Linkage
    Lu, Yang
    Sinnott, Richard O.
    Verspoor, Karin
    [J]. INTEGRATING AND CONNECTING CARE, 2017, 239 : 84 - 90
  • [46] Distributed K-Anonymity Location Privacy Protection Scheme Based on Blockchain
    Liu, Hai
    Li, Xing-Hua
    Luo, Bin
    Wang, Yun-Wei
    Ren, Yan-Bing
    Ma, Jian-Feng
    Ding, Hong-Fa
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 942 - 960
  • [47] Dummy Location Selection Scheme for K-anonymity in Location based Services
    Wu, Di
    Zhang, Yu
    Liu, Yinlong
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 441 - 448
  • [48] Research on k-anonymity privacy protection scheme based on bilinear pairings
    Song Cheng
    Zhang Yadong
    Wang Lei
    Liu Zhizhong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2018, 25 (05) : 12 - 19
  • [49] Mastering data privacy: leveraging K-anonymity for robust health data sharing
    Karagiannis, Stylianos
    Ntantogian, Christoforos
    Magkos, Emmanouil
    Tsohou, Aggeliki
    Ribeiro, Luis Landeiro
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (03) : 2189 - 2201
  • [50] A Scheme for Three-way Secure and Verifiable E-Voting
    Nassar, Mohamed
    Malluhi, Qutaibah
    Khan, Tanveer
    [J]. 2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,