Journal of Computer Applications ›› 2018, Vol. 38 ›› Issue (4): 1036-1040.DOI: 10.11772/j.issn.1001-9081.2017102400

Previous Articles     Next Articles

New voting protocol based on homomorphic threshold cryptography

DAI Xiaokang1,2, CHEN Changbo2, WU Wenyuan2   

  1. 1. College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400000, China;
    2. Chongqing Key Laboratory of Automated Reasoning & Cognition, Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, Chongqing 400700, China
  • Received:2017-10-10 Revised:2017-11-30 Online:2018-04-10 Published:2018-04-09
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (11471307, 11671377, 11771421), the Chongqing Research Program of Basic Research and Frontier Technology (cstc2015jcyjys40001).


代小康1,2, 陈长波2, 吴文渊2   

  1. 1. 重庆邮电大学 计算机科学与技术学院, 重庆 400000;
    2. 中国科学院重庆绿色智能技术研究院 自动推理与认知重庆市重点实验室, 重庆 400700
  • 通讯作者: 陈长波
  • 作者简介:代小康(1993-),男,湖北洪湖人,硕士研究生,主要研究方向:信息安全、隐私保护;陈长波(1981-),男,山东济宁人,副研究员,博士,主要研究方向:符号计算、信息安全;吴文渊(1976-),男,四川成都人,研究员,博士,主要研究方向:自动推理、信息安全。
  • 基金资助:

Abstract: A new voting protocol was proposed to solve the problem that most of the existing voting protocols require a trusted management authority. This protocol comprehensively makes use of homomorphic encryption, threshold cryptography, blind signature, ring signature, zero knowledge proof, and so on, to resolves the coexistence problem between robustness and the absence of trusted third party under the assumption that no one abstains from voting or the authority does not cheat conspiracy with other voters when one voter abstains from voting, at the same time, anonymity, eligibility, robustness, verifiability and no trusted third party are also satisfied.

Key words: voting protocol, threshold cryptosystem, homomorphic encryption, robustness, no trusted third party

摘要: 针对当前存在的投票协议普遍要求一个可信赖的管理机构的问题,提出一种新的投票协议。该协议综合运用同态加密、门限密码体制、盲签名、环签名、零知识证明等密码技术,在假设无人弃权或虽有人弃权但管理者不与其他投票人合谋作弊的情况下,消除了无可信第三方和健壮性共存的矛盾,同时满足了匿名性、合法性、健壮性、可验证性和无可信第三方等安全属性。

关键词: 投票协议, 门限密码体制, 同态加密, 健壮性, 无可信第三方

CLC Number: