计算机科学 ›› 2020, Vol. 47 ›› Issue (9): 275-282.doi: 10.11896/jsjkx.190900125

所属专题: 信息安全 虚拟专题

• 信息安全 • 上一篇    下一篇

安全性电子投票方案研究综述

蒲泓全1,2,3, 崔喆1,2, 刘霆1,2,3, 饶金涛1,2   

  1. 1 中国科学院成都计算机应用研究所 成都610041
    2 中国科学院大学 北京100049
    3 广西混杂计算与集成电路设计分析重点实验室 南宁530006
  • 收稿日期:2019-09-18 发布日期:2020-09-10
  • 通讯作者: 崔喆(cuizhe@casit.com.cn)
  • 作者简介:774149765@qq.com
  • 基金资助:
    国家自然科学基金(61501064);四川省科技支撑计划项目(2015GZ0088);广西混杂计算与集成电路设计分析重点实验室开放基金(HCIC201701)

Comprehensive Review of Secure Electronic Voting Schemes

PU Hong-quan1,2,3, CUI Zhe1,2, LIU Ting1,2,3,RAO Jin-tao1,2   

  1. 1 Chengdu Institute of Computer Applications,Chinese Academy of Sciences,Chengdu 610041,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
    3 Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis,Nanning 530006,China
  • Received:2019-09-18 Published:2020-09-10
  • About author:PU Hong-quan,born in 1990,Ph.D.His main research interests include electronic voting and information security.
    CUI Zhe,born in 1970,Ph.D,professor,doctoral supervisor.His main research intersts include pattern recognition and information security.
  • Supported by:
    National Natural Science Foundation of China (61501064),Sichuan Technology Support Program (2015GZ0088) and Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis (HCIC201701).

摘要: 近年来,电子投票因可以大幅度提高投票活动的效率和结果的准确性而得到高度关注。安全性问题一直是制约电子投票发展的瓶颈,许多研究者针对某一应用功能场景提出了相关的电子投票方案。结合电子投票的学术研究现状,详细分析了电子投票的类型、模型和安全性要求,并结合盲签名、秘密分享等相关密码学技术对4种类型的典型电子投票方案进行了综述和分析,然后介绍了成熟的电子投票系统,最后研究了电子投票未来可能的发展方向,对电子投票方案的进一步优化和改进提供借鉴和参考。

关键词: 安全性要求, 电子投票, 盲签名, 秘密分享, 密码学技术

Abstract: In recent years,electronic voting has been highly concerned because it can greatly improve the efficiency of voting activities and the accuracy of the results.The security problem has been the bottleneck of the development of electronic voting.Many researchers put forward relevant electronic voting schemes for a certain application function scenario.Combined with the academic research status of electronic voting,this paper analyzes the types,models and security requirements of electronic voting in detail,summarizes and analyzes four types of typical electronic voting schemes by combining blind signature,secret sharing and other related cryptography technologies,then introduces the mature electronic voting system,and finally this paper studies the possible development direction of electronic voting in the future,which provides reference for further optimization and improvement of electronic voting schemes.

Key words: Blind signature, Cryptography technology, Electronic voting, Secret sharing, Security requirements

中图分类号: 

  • TP309.2
[1] MENG B,WANG D J.Secure remote network voting protocol[M].Beijing:Science Press,2013:3-4,16-18,76-81.
[2] BENALOH J,TUINSTRA D.Receipt-free secret-ballot elec-tions[C]//Twenty-sixth ACM Symposium on Theory of Computing.1994:544-553.
[3] CANETTI R,DWORK C,NAOR C,et al.Deniable encryption[C]//Annual International Cryptology Conference on Advances in Cryptology-CRYPTO ’97.1997:90-104.
[4] CRAMER R,FRANKLIN M,SCHOENMAKERS B,et al.Multi-authority secret ballot elections with linear work[C]//Proceedings of the 15th Annual International Conference on Theory and Application of Cryptographic Techniques.1996:72-83.
[5] LEE B,KIM K.Reciept-free electronic voting scheme with atamper resistant randomizer [C]//Proceedings of the 5th International Conference on Information Security and Cryptology.2002:405-422.
[6] DAMAGARD I,JURIK M,NIELSEN J B.A generalization ofPaillier’s public-key system with applications to electronic vo-ting[J].International Journal of Information Security,2010,9(6):371-385.
[7] KIAYIAS A,YUNG M.The voctor-ballot approach for online voting procedures[J].Lecture Notes in Computer Science,2010,6000(1):155-174.
[8] MENG B.A critical review of receipt-freeness and coercion-resistance[J].Information Technology Journal,2009,8(7):934-964.
[9] SUN M H.Modern cryptography research on secure multi-party computation protocols[M].Beijing:Publishing House of Electronics Industry,2016:72-74.
[10] CHEN K B.The research and application on the electronic vo-ting protocol[D].Hefei:Hefei University of Technology,2006.
[11] FUJILKA A,OKATOMA T,OHTA T.A practical secret vot-ing scheme for large-scale elections[C]//Advances in Cryptology-AUSCRYPT’92.1992:244-251.
[12] JUELS A,CATALANO D,JAKOBSSON M.Coercion-resist-ant electronic elections[J/OL].Towards Trustworthy Elections,2010:37-63.http://www.arijuels.com/wp-content/uploads/2013/09/JCJ05.pdf.
[13] SAKO K,KILIAN J.Receipt-free mix-type voting scheme-Apractical solution to the implementation of a voting booth[C]//International Conference on the Theory and Application of Cryptographic Techniques in Cryptology-EUROCRYPT’95.1995:393-403.
[14] RIERA A,RIFA J,BORRELL J.Efficient construction of vote-tags to allow open objection to the tally in electronic elections[J].Information Processing Letters,2000,75(5):211-215.
[15] CHAUM D.Untraceable electronic mail,return address,anddigital pseudonyms[J].Communications of the ACM,1981,24(2):84-90.
[16] FURUKAWA J,SAKO K.An efficient scheme for proving ashuffle[C]//The 21st Annual InternationalCryptology Confe-rence on Advances in Cryptology-CRYPTO’2001.2001:19-23.
[17] SAKO K,KILIAN J.Receipt-free mix-type voting scheme[C]//International Conference on the Theory and Applications of Cryptographic Techniques-EUROCRYPT’95.1995:393-403.
[18] ABE M.Mix-Networks on Permutation Networks[C]//International Conference on the Theory and Application of Cryptology and Information Security-ASIACRYPT’99.1999:258-273.
[19] NEFF C A.A verifiable secret shuffle and its application to e-voting[C]//Proceedings of the 8th ACM Conference on Computer and Communications Security.2001:116-125.
[20] CHAUM D.Blind signatures for untraceable payment[C]//Advances in Cryptology Proceedings of CRYPTO’82.1983:199-203.
[21] OKAMOTO T.Provably secure and practical identificationschemes and corresponding signature schemes[C]//Advances in Cryptology-CRYPTO’92.1992:31-53.
[22] YAO Y F,ZHU H F,CHEN K S.Generalized ELGamal type blind signature schemes based on affine transform[J].Acta Electronica Sinica,2000,28(7):128-129.
[23] FAN C I,CHEN W K,YEH Y S.Randomization enhancedChaum’s blind signature scheme[J].Computer Communications,2000,23(17):1677-1680.
[24] SHI Y H,LI W S.XMLblind signature scheme based on RSA public key system[J].Computer Engineering,2004,30(19):101-103.
[25] XIA M M,GU L Z.A new proxy blind signature scheme[J].Journal of Beijing University of Posts & Telecommunications,2006,29(3):48-52.
[26] ZHANG J H,GAO S N.Efficient provable certificateless blind signature scheme[C]//Proceedings of the IEEE International Conference on Networking,Sensing and Control(ICNSC 2010).2010:10-12.
[27] FAN C I,SUN W Z,HUANG S M.Provably secure randomized blind signature scheme based on bilinear pairing[J].Computers &Mathematics with Applications,2010,60(2):285-293.
[28] SHAO J G,XUE B,CHEN M.Certificateless partially blind signature scheme based on the elliptic curve discrete logarithm problem[J].Advanced Engineering Science,2012,44(1):112-117.
[29] SINGH N,DAS S,SINGH N,et al.A novel proficient blind signature scheme using ECC[C]//International Conference on Emergent Trends in Computing and Communication.International Journal of Computer Applications,2014:66-72.
[30] ZHANG J L,ZHAGN J Z,XIE S C.Improvement of a quantum proxy blind signature scheme[J].International Journal of Theoretical Physics,2018,57(6):1612-1621.
[31] CRANOR L F,CYTRON R K.Sensus:a security-conscious electronic polling system for the Internet[C]//Proceedings of The Thirtieth Annual Hawwaii International Conference on System Sciences.IEEE Computer Society,1997.
[32] HERSCHBERG M A.Secure electronic voting over the World Wide Web[R/OL].http://dspace.mit.edu/handle/1721.1/43497.
[33] LUO F F,LIN C L,ZHAGN S Y,et al.Receipt-freeness electronic voting scheme based on FOO voting protocol[J].Computer Science,2015,42(8):180-184.
[34] OKAMOTO T.Receipt-free electronic voting schemes for large scale elections[C]//International 5th Workshop on Security Protocols.1997:25-35.
[35] SHUBINA A M,SMITH S W.Design and prototype of a coercion resistant,voter verifiable electronic voting system[C]//Proceedings of the 22nd Annual Conference on Privacy,Security and Trust.2004:29-39.
[36] CHANG C C,LEE J S.An anonymous voting mechanism based on the key exchange protocol[J].Computers & Security,2006,25(4):307-314.
[37] FAN C I,SUN W Z.An efficient multi-receipt mechanism for uncoercible anonymous electronic voting[J].Mathematical and Computer Modelling,2008,48(9/10):1611-1627.
[38] GUO L L,GU L Z,LI Z X.The scheme of non-receipt electro-nic voting based on group and blind signature[C]//Proceedings of Academic Conference on Communications in China Colleges and Universities.2009:225-230.
[39] CHEN X F,WU Q H,ZHANG F G,et al.New receipt-free voting scheme using double-trapdoor commitment[J].Information Sciences,2011,181(8):1493-1502.
[40] WANG B Y,YANG F,HU Y F.Online Voting Scheme Based on Blind Digital Signature[J].Journal of Chinese Mini-Micro Computer Systems,2003,24(3):587-591.
[41] YE W.FOO protocol and its improvement in electronic voting system[D].Wuhan:Wuhan University of Technology,2009.
[42] MOHANTY S,MAJHI B.A secure multi authority electronic voting protocol based on blind signature[C]//2010 Internatio-nal Conference on Advances in Computer Engineering.2010:271-273.
[43] LOPEZ-GARCIA L,PEREZ L J D,RODRIGUEZ-HENRIQUEZ F.A pairing-based blind sgnature e-voting scheme[J].The Computer Journal,2014,57(10):1460-1471.
[44] KUMAR M,KATTI C P,SAXENA P C.A secure anonymous e-voting system using identity-based blind signature scheme[C]//International Conference on Information Systems Security.2017:29-49.
[45] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[46] BLAKLEY G.Safeguarding cryptographic key[C]//AFIPS1979 National Computer Conference.1979:313-317.
[47] ASMUTH C,BLOOM J.A modular approach to keysafeguar-ding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
[48] PADRO C,SAEZ G,VILLAR J L.Detection of cheaters in vector space secret sharing schemes[J].Designs,Codes and Cryptography,1999,16(1):75-85.
[49] KARNIN E D,GREENE J,HELLMAN M E.On secret sharing systems[J].IEEE Transaction on Information Theory,1983,29(1):35-41.
[50] HE J,DAWSON E.Multistage secret sharing based on one-way function[J].Electronics Letters,1994,30(19):1591-1592.
[51] HARN L.Comment:Multistage secret sharing based on one-way function[J].Electronics Letters,1995,31(4):262.
[52] GENG Y J,GUO L Z,ZHEGN M H.Improved Multi-secretSharing Scheme Based on One-Way Function[J].TELKOMNIKA Indonesian Journal of Electrical Engineering,2014,12(6):4463-4467.
[53] LINKS N N,SIMMONS G J.A protocol to set up shared secret schemes without the assistance of a mutually trusted party[C]//Advances in Cryptology-EUROCRYPT’90.Springer-Verlag,1991:266-282.
[54] NAOR M,SHAMIR A.Visual Cryptography [C]//Advances in Cryptology-EUROCRYPT’94.1995:1-12.
[55] HSU H C,CHEN T S,LIN Y H.The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing[C]//2004 IEEE International Conference on Networking,Sensing and Control.2004:996-1001.
[56] QIN S J,LIU T L,WEN Q Y.Quantum secret sharing based on entanglement swapping and local operation[J].Journal of Beijing University of Posts and Telecommunications,2005,28(4):74-77.
[57] SCHOENMAKERS B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[C]//Annual International Cryptology Conference-CRYPTO’99.1999:148-164.
[58] IFTENE S.General secret sharing based on the Chinese Re-mainder Theorem with applications in e-voting[J].Electronic Notes in Theoretical Computer Science,2007,186(1):67-84.
[59] ZWIERKO A,KOTULSKI Z.A light-weight e-voting system with distributed trust[J] Electronic Notes in Theoretical Computer Science,2007,168:109-126.
[60] CHEN Q M.Research on verifiable secret sharing based on Chinese Remainder Theorem[D].Hefei:Hefei University of Technology,2011.
[61] NAIR D G,BINUV P,KUMAR G S.An improved e-votingscheme using secret sharing based secure multi-party computation[C]//8th International Conference on Communication Networks (ICCN-2014).2014:130-137.
[62] ZHAO Q Y,LIU Y N.E-voting scheme using secret sharing and K-anonymity[C]//International Conference on Broadband &Wireless Computing.2017:893-900.
[63] YUAN L F,LI M C,GUO C,et al.A verifiable e-voting scheme with secret sharing[J].International Journal of Network Security,2017,19(2):260-271.
[64] MIGNOTTE M.How to Share a Secret[C]//Proceedings of the Workshop on Crytography.Burg Feuerstein,Germany,1983:371-375.
[65] RIVEST R L,ADLEMAN L,DERTOUZOS M L.On databanks and privacy homomorphisms [J/OL].Foundations of Secure Computation,1978:169-179.http://people.csail.mit.edu/rivest/RivestAdlemanDertouzos-OnDataBanksAndPrivacyHomomorphisms.pdf.
[66] GONG L M,LI S D,GUO Y.The development and applications of homomorphic encryption[J].ZTE Technology Journal,2016,22(1):26-29.
[67] ELGAMAL T.A public key cryptosystem and a signaturescheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472.
[68] PAILLIER P.Public-key cryptosystems based on composite degree Residuosity Classes[C]//International Conference on the Theory and Application of Cryptographic Techniques in Cryptology-EUROCRYPT’99.1999:223-238.
[69] GOLDWASSER S,MICALI S.Probabilistic encryption[J].Journal of Computer and System Sciences,1984,28(2):270-299.
[70] BONEH D,GOH E J,NISSIM K.Evaluating 2-DNF formulas on ciphertexts[C]//Theory of Cryptography Conference.2005:325-341.
.
[71] DOMINGO-FERRER J.A provably secure additive and multiplicative privacy homomorphism.[C]//The 5th International Conference on Information Security.2002:471-483.
[72] MELCHOR C A,GABORIT P,HERRANZ J.Additively homomorphic encryption with d-operand multiplications[C]//Advances in Cryptology(CRYPTO’2010).2010:138-154.
[73] PLANTARD T,SUSILO W,ZHANG Z.Fully homomorphicencryption using hidden ideal lattice[J].IEEE Transactions on Information Forensics and Security,2013,8(12):2127-2137.
[74] GARG S,GENTRY C,HALEVI S,et al.Attribute-based en-cryption for circuits from multilinear maps[J].Computer Scie-nce,2012,45(6):479-499.
[75] DAMGARD I,JURIK M.A generalisation,a simplification and some applications of Paillier’s probabilistic public-key system[J].Lecture Notes in Computer Science,2000,7(45):119-136.
[76] DAMGARD I,GROTH J,SALOMONSEN G.The theory and implementation of an electronic voting system[M/OL].Secure Electronic Voting.2002:77-99.http://www.instore.gr/evote/evote_end/htm/3public/doc3/public/crm/the_theory_and_implementation_of_an_electronic_voting_system.pdf.
[77] MENG B.A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext[J].Journal of Networks,2009,4(5):370-377.
[78] HAN W,ZHENG D,CHEN K F.A receipt-free punch-hole ballot electronic voting scheme[C]//The Third International IEEE Conference on Signal-Image Technologies and Internet-Based System.2008.
[79] WAGN Y H,XU C,CHEN J W,et al.Scheme on secure voting system based on HElib[J].Application Research of Computers,2017,34(7):2167-2171.
[80] HE Q,SHEN W.Multi-candidate electronic voting schemebased on homomorphic encryption[J].Computer Systems & Applications,2019,28(2):146-151.
[81] Durette B W.Multiple Administrators for Electronic Voting[J/OL].Bachelor’s Thesis Mit,1999.http://groups.csail.mit.edu/cis/theses/DuRette-bachelors.pdf.
[1] 冯雁, 王蕊聪.
基于量子傅里叶变换求和的量子投票协议
Quantum Voting Protocol Based on Quantum Fourier Transform Summation
计算机科学, 2022, 49(5): 311-317. https://doi.org/10.11896/jsjkx.210300058
[2] 姜昊堃, 董学东, 张成.
改进的具有前向安全性的无证书代理盲签名方案
Improved Certificateless Proxy Blind Signature Scheme with Forward Security
计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049
[3] 江泽涛, 徐娟娟.
云环境下基于代理盲签名的高效异构跨域认证方案
Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment
计算机科学, 2020, 47(11): 60-67. https://doi.org/10.11896/jsjkx.191100068
[4] 董晨, 季姝廷, 张皓宇, 李磊.
一种面向门限结构的操作式可视多秘密分享方案
Operational Visual Multi-secret Sharing Scheme for Threshold Structure
计算机科学, 2020, 47(10): 322-326. https://doi.org/10.11896/jsjkx.190800069
[5] 王兴威, 侯书会.
一种改进的高效的代理盲签名方案
Improved Efficient Proxy Blind Signature Scheme
计算机科学, 2019, 46(6A): 358-361.
[6] 刘二根,王霞,周华静,郭红丽.
改进的无证书代理盲签名方案
Improved Certificateless Proxy Blind Signature Scheme
计算机科学, 2016, 43(8): 92-94. https://doi.org/10.11896/j.issn.1002-137X.2016.08.019
[7] 罗芬芬,林昌露,张胜元,刘忆宁.
基于FOO投票协议的无收据电子投票方案
Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol
计算机科学, 2015, 42(8): 180-184.
[8] 秦宁元,付安民,陈守国.
LTE/LTE-A网络中基于盲签名的具有条件隐私保护的切换认证协议
Blind Signature-based Handover Authentication Protocol with Conditional Privacy Preserving in LTE/LTE-A Networks
计算机科学, 2015, 42(8): 145-151.
[9] 刘树波,王颖,刘梦君.
隐私保护的参与式感知数据分享与访问方案
Privacy-preserving Data Sharing and Access Control in Participatory Sensing
计算机科学, 2015, 42(6): 139-144. https://doi.org/10.11896/j.issn.1002-137X.2015.06.031
[10] 侯整风,王鑫,韩江洪,朱晓玲.
基于双线性对的部分盲签名中的“约分攻击”
“Reduction Attacks” in Partially Blind Signature Based on Bilinear Pairings
计算机科学, 2013, 40(5): 136-140.
[11] 朱晓玲,陆阳,张本宏,侯整风.
一种公平有效的假名管理模型
Efficient Fair Pseudonym Management Model
计算机科学, 2013, 40(11): 122-125.
[12] 刘淳,张建学.
RFID技术电子投票应用的探讨
Review on E-voting System Using RFID Technology and its Security
计算机科学, 2011, 38(Z10): 440-443.
[13] 付正欣,郁滨,房礼国.
具有伪装图案的操作式多秘密视觉密码
Operation-based Multi-secret Visual Cryptography Scheme with Disguised Patterns
计算机科学, 2011, 38(6): 90-92.
[14] 刘文远 张爽 张江霄.
基于公开可验证秘密分享的公平合同签署协议

计算机科学, 2009, 36(2): 111-113.
[15] 胡小明 黄上腾.
两个可证明安全盲签名方案的密码学分析

计算机科学, 2008, 35(8): 98-100.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!