A Electronic Voting Protocol Based upon t-out-of-n Oblivious Signature Scheme

碩士 === 長庚大學 === 電機工程學系 === 101 === E-voting is an online system which simulates the vote of citizen in real life. It considers the security. The properties fit in with the voting situation in real life. Simply speaking, it lets people vote electronically and online to save time, manpower and materia...

Full description

Bibliographic Details
Main Authors: Jiun Ming Chen, 陳俊名
Other Authors: S. Y. Chiou
Format: Others
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/38302440303546954407
Description
Summary:碩士 === 長庚大學 === 電機工程學系 === 101 === E-voting is an online system which simulates the vote of citizen in real life. It considers the security. The properties fit in with the voting situation in real life. Simply speaking, it lets people vote electronically and online to save time, manpower and material resources. It also let citizen vote simple and easily. The project proposes a real-time voting system achieving privacy and authenticity using mobile devices. We consider the strategy and application of Oblivious Signatures in mobile devices. We also consider the real-time voting result achieving privacy and authenticity, make a complete research and discussion, and research the voting application of mobile devices, to propose an new E-voting method for mobile devices. The method can let users vote by using the mobile devices, which users take along with themselves all the time. It let users vote more convenient using the function of mobile devices. Also, considering the data protection of mobile network application, privacy of person and authenticity of information, we designs a security protocol possessing privacy and authenticity. Finally we implement the protocol on the mobile phone to let uses vote via their smart phones. This system can be used in not only every kinds of voting but also survey of rates of candidate which people are going to vote. Our system achieves soundness, completeness, fairness, privacy, verifiability, eligibility, and unreusability. It also guarantees that no one, including servers, can cheat users. It can be used in centralized and decentralized modes.