Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Electronic voting scheme based on SM2 threshold blind signature
Jintao RAO, Zhe CUI
Journal of Computer Applications    2024, 44 (2): 512-518.   DOI: 10.11772/j.issn.1001-9081.2022121876
Abstract150)   HTML3)    PDF (1208KB)(184)       Save

An electronic voting scheme based on SM2 blind threshold signature was proposed to address the security and efficiency issues in the algorithm protocol layer of domestic electronic election system. Firstly,the SM2 threshold blind signature algorithm was constructed based on the SM2 signature algorithm,the methods of Shamir secret sharing, Random Secret Sharing (RSS), secret sum, difference and product sharing, and Inversion Secret Sharing (ISS) were used to share the secret private key and random number in SM2 signature algorithm without changing the original signature process. At the same time,a blinding factor was introduced to blind the message to be signed, achieving the privacy protection of the message sender and effective sharing of sensitive information. Secondly,the algorithm security analysis results show that, the constructed blind signature algorithm has blindness, robustness,and non-forgeability under the random oracle model. Compared with the existing RSA (Rivest-Shamir-Adleman) and Elliptic Curve Digital Signature Algorithm (ECDSA) threshold blind signature algorithms,the constructed SM2 threshold blind signature algorithm has the advantages of low computational complexity and small computational cost, making it suitable for large-scale elections. Finally, a secure electronic voting protocol was designed based on the SM2 threshold blind signature algorithm. The analysis results show that the proposed protocol has properties such as non-forgeability, confidentiality, legality, and robustness. Furthermore, a single voting process can be completed in just 15.706 1 ms.

Table and Figures | Reference | Related Articles | Metrics