计算机科学 ›› 2022, Vol. 49 ›› Issue (1): 321-327.doi: 10.11896/jsjkx.201000032

• 信息安全 • 上一篇    下一篇

基于门限环签名的分级匿名表决方案

范家幸1, 王志伟1,2,3   

  1. 1 南京邮电大学计算机学院 南京210023
    2 江苏省大数据安全与智能处理重点实验室 南京210023
    3 江苏省计算机网络技术重点实验室 南京210096
  • 收稿日期:2020-10-08 修回日期:2021-04-04 出版日期:2022-01-15 发布日期:2022-01-18
  • 通讯作者: 王志伟(zhwwang@njupt.edu.cn)
  • 作者简介:jx_fan@126.com
  • 基金资助:
    国家自然科学基金(61672016)

Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature

FAN Jia-xing1, WANG Zhi-wei1,2,3   

  1. 1 School of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    2 Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,Nanjing 210023,China
    3 Jiangsu Key Laboratory of Computer Networking Technology,Nanjing 210096,China
  • Received:2020-10-08 Revised:2021-04-04 Online:2022-01-15 Published:2022-01-18
  • About author:FAN Jia-xing,born in 1996,postgra-duate,Her main research interests include public key cryptography and cryptography applications.
    WANG Zhi-wei,born in 1976,Ph.D,professor.His main research interests include applied cryptography,public key cryptography,etc.
  • Supported by:
    National Natural Science Foundation of China(61672016).

摘要: 表决是现代民主社会常用的一种方式,涉及政治、股份企业、法院判决等多个领域。表决是一种特殊的投票,它只有“同意”和“否决”两个候选对象,一方票数过半即得结果。区块链作为一种自带对账功能的数字记账技术,具有时间戳、公开性、不可篡改等特性,满足表决的透明性和可验证性。为实现表决的匿名性,文中采用环签名来隐藏表决内容与表决者的对应关系。文中提出的分级匿名表决方案,实现了表决的合法性、保密性、不可重复性、可更新性和可验证性。通过为表决者产生虚拟身份形成层级机制,可用于各表决者持票数不等的场景;分级匿名表决协议将门限环签名方案运用到表决场景,使得表决过程中一旦一方票数过半即可签名得到最终的表决结果,计票过程简单、高效。

关键词: 分级, 门限环签名, 匿名表决, 区块链, 虚拟身份

Abstract: Voting is a commonly used method in modern democratic society,involving many fields such as politics,stock companies,court decisions,etc.Voting is regarded as a specific form of balloting,with only two candidates in pro and con.Blockchain is a digital accounting technology with the characteristics of time stamp,openness and non-tamperability which satisfy the transpa-rency and verifiability of voting.In order to realize the anonymity of voting,this paper uses ring signature to hide the correspondence between voting content and the voter.This paper puts forward a hierarchical anonymous voting scheme,which realizes the legitimacy,confidentiality,non-repeatability,updateability and verifiability of voting.By creating a hierarchy mechanism for the voting of virtual identities,it can be used in situations where the votes vary from vote to each voter,and this agreement applies the threshold ring signature scheme to the voting scene for the first time,making the voting process simple and efficient for the final voting results once one party has more than half of the votes cast.

Key words: Anonymous voting, Blockchain, Hierarchical, Threshold ring signature, Virtual identity

中图分类号: 

  • TP309
[1]CHAUM D L.Untraceable electronic mail return addresses,and digital pseudonyms[J].Commun ACM(USA),1981,24(2):84-88.
[2]WANG K H,MONDAL S K,CHAN K,et al.A review of contemporary e-voting:Requirements,technology,systems and usability[J].Data Science and Pattern Recognition,2017,1(1):31-47.
[3]GRITZALIS D A.Principles and requirements for a secureevoting system[J].Computers & Security,2002,21(6):539-556.
[4]ANANE R,FREELAND R,THEODOROPOULOS G.E-voting requirements and implementation[C]//The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing.E-Commerce and E-Services,2007:382-392.
[5]RIBARSKI P,ANTOVSKI L.Comparison of ID-based blindsignatures from pairings for e-voting protocols[C]//International Convention on Information and Communication Technology.Electronics and Microelectronics,2014:1394-1399.
[6]ÀNGELS CERVERÓ M,VÍCTOR M,MIRET J M,et al.An Efficient Homomorphic E-Voting System over Elliptic Curves[C]//International Conference on Electronic Government and the Information Systems Perspective.2014:41-53.
[7]PENG K,BAO F.Efficient Multiplicative Homomorphic E-Vo-ting[C]//International Conference on Information Security.Springer-Verlag,2010:381-393.
[8]LEE B,BOYD C,DAWSON E,et al.Providing receipt-freeness in mixnet-based voting protocols[C]//International Conference on Information Security and Cryptology.2004:245-258.
[9]ZHONG S,BONEH D,JAKOBSSON M,et al.Optimistic mi-xing for exit-polls[C]//International Conference on the Theory and Application of Cryptology and Information Security.2002:451-465.
[10]KUMAR M,KATTI C P,SAXENA P C.A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme[C]//International Conference on Information Systems Security.2017:29-49.
[11]COHEN J D,FISCHER M J.A robust and verifiable cryptographically secure election scheme[C]//Symposium on Foundations of Computer Science.IEEE,1985:372-382.
[12]CRAMER R,GENNARO R,SCHOENMAKERS B.A secureand optimally efficient multi-authority election scheme[J].Transactions on Emerging Telecommunications Technologies,2012,8(5):481-490.
[13]BAUDRON O,FOUQUE P A,POINTCHEVAL D,et al.Practical multi-candidate election system[C]//Twentieth Acm Symposium on Principles of Distributed Computing.2001:274-283.
[14]LIU J K.Ring Signature[C]//Advances in Cyber Security:Prin-ciples,Techniques,and Applications.2019:93-114.
[15]CHOW S S M,WEI V K,LIU J K,et al.Ring signatures without random oracles[C]//Proceedings of the 2006 ACM Symposium on Information,Computer and Communications Security.2006:297-302.
[16]WANG H,HE D,LIU Z,et al.Blockchain-Based AnonymousReporting Scheme With Anonymous Rewarding[J].IEEE Transactions on Engineering Management,2019,6(2):3676-3687.
[17]KURBATOV O,KRAVCHENKO P,POLUYANENKO N,et al.Using Ring Signatures For An Anonymous E-Voting System[C]//2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).2019:187-190.
[18]TORNOS J L,SALAZAR J L,PILES J J.Optimizing ring signa-ture keys for e-voting[C]//2015 International Wireless Communications and Mobile Computing Conference.2015:817-821.
[19]TSANG P P,WEI V K.Short linkable ring signatures for e-vo-ting,e-cash and attestation[C]//International Conference on Information Security Practice and Experience.2005:48-60.
[20]BRESSON E,STERN J,SZYDLO M.Threshold Ring Signa-tures and Applications to Ad-hoc Groups[C]//Annual International Cryptology Conference.2002:465-480.
[21]YUEN T H,LIU J K,AU M H A,et al.Threshold ring signature without random oracles[C]//Acm Symposium on Information.2011:261-267.
[22]HJALMARSSON F P,HREIOARSSON G K,HAMDAQA M,et al.Blockchain-Based E-Voting System[C]//2018 IEEE 11th International Conference on Cloud Computing.2018:983-986.
[23]HARDWICK F S,AKRAM R N,MARKANTONAKIS K.E-Voting with Blockchain:An E-Voting Protocol with Decentra-lisation and Voter Privacy[C]//in Proc.iThings & GreenCom &CPSCom & SmartData.2018:1561-1567.
[24]BONEH D.Evaluating 2-DNF Formulas on Ciphertexts[C]//Springer-Verlag.2005:325-341.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[3] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[13] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[14] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[15] 温啸林, 李长林, 张馨艺, 刘尚松, 朱敏.
基于DPoS共识机制的区块链社区演化的可视分析方法
Visual Analysis Method of Blockchain Community Evolution Based on DPoS Consensus Mechanism
计算机科学, 2022, 49(1): 328-335. https://doi.org/10.11896/jsjkx.201200118
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!