Computer Science ›› 2022, Vol. 49 ›› Issue (5): 311-317.doi: 10.11896/jsjkx.210300058
• Information Security • Previous Articles Next Articles
FENG Yan1,3, WANG Rui-cong1,2
CLC Number:
[1]DAVID C.Untraceable electronic mail,return addresses,anddigital pseudonyms[J].Communications of the ACM,1981,24(2):84-90. [2]CHRISTANDL M,WEHNER S.Quantum Anonymous Trans-missions[C]//Proceedings of 11th ASIACRYPT.Berlin:Springer,2005:217-235. [3]HILLERY M.Quantum voting and privacy protection:firststeps[J].SPIENewsroom,2006,10:1117. [4]VACCARO J A,SPRING J,CHEFLES A.Quantum protocols for anonymous voting and surveying[J].Physical Review A,2005,75(1):10064-10070. [5]DU G,ZHOU B M,MA C G,et al.A Secure Quantum Voting Scheme Based on Orthogonal Product States[J].International Journal of Theoretical Physics,2021,60(4):1374-1383. [6]WANG Q.Application of blind signature in electronic votingsystem based on coding[J].Digital World,2020,179(9):5-6. [7]YANG Y T,ZHAO Y,ZHANG Q L,et al.HomomorphicWeighted Electronic Voting System Based on SEAL Library[J].Chinese Journal of Computers,2020,43(4):711-723. [8]HOROSHKO D,KILIN S.Quantum anonymous voting withanonymity check[J].Physics Letters A,2011,375(8):1172-1175. [9]YAN P L,ZHOU F X,WANG T Y,et al.Novel Quantum Vo-ting Protocol with Eight-Qubit Cluster Entangled State[J].International Journal of Theoretical Physics,2020,59(9):2671-2680. [10]WANG J,XU G B,JIANG D H.Quantum Voting Scheme with Greenberger-Horne-Zeilinger States[J].International Journal of Theoretical Physics,2020,59(8):2599-2605. [11]LIU X H,WEN X J,FAN X C,et al.A Secure Quantum Voting Protocol Based on Four-particle GHz State[J].Chinese Journal of Quantum Electronics,2017,34(6):721-726. [12]SONG X L,CAO Y F,YANG S.Quantum voting scheme based on D-dimensional three-particle entangled states[J].Acta Electronica Sinica,2020,48(7):1355-1360. [13]QIAN X Q.Research on secure multiparty sorting[D].Hefei:Anhui University,2013. [14]SHI R H,MU Y,ZHONG H,et al.Secure Multiparty Quantum Computation for Summation and Multiplication[J].Scientific Reports,2016,6(1):1-9. [15]YANG H Y,YE T Y.Secure multi-party quantum summation based on quantum Fourier transform[J].Quantum Information Processing,2018,17(6):1-17. [16]DU J Z,CHEN X B,WEN Q Y,et al.Secure multiparty quantum summation[J].Acta physica Sinica,2007,56(11):6214-6219. [17]YE T Y,HU J L.Quantum Safe Multiparty Sum Based on the Mutual Unbiased Basis of D-order Quantum Systems and Its Applications[J].Science China:Physics,Mechanics and Astronomy,2021,51 (2):88-95. [18]OVERILL R E.Review:Foundations of Cryptography,Volume II:Basic Applications[J].Journal of Logic and Computation,2005,15(3):405-405. [19]WANG R C,FENG Y.Secure multi-party quantum sorting protocol based on quantum summation[J].Chinese Journal of Quantum Electronics,2021,38(3):354-364. [20]QIN J Q.Design and analysis of quantum voting protocol based on multi-body entangled states[D].Hefei:Anhui University,2019. [21]TIAN J H,ZHANG J Z,LI Y P.A Voting Protocol Based on the Controlled Quantum Operation Teleportation[J].International Journal of Theoretical Physics,2016,55(5):2303-2310. [22]THAPLIYAL K,SHARMAR D,PATHAK A.Analysis and improvement of Tian-Zhang-Li voting protocol based on controlled quantum teleportation[J].arXiv:2016,1602.00791. |
[1] | PU Hong-quan, CUI Zhe, LIU Ting,RAO Jin-tao. Comprehensive Review of Secure Electronic Voting Schemes [J]. Computer Science, 2020, 47(9): 275-282. |
[2] | LUO Fen-fen, LIN Chang-lu, ZHANG Sheng-yuan and LIU Yi-ning. Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol [J]. Computer Science, 2015, 42(8): 180-184. |
[3] | . Threshold-based Electronic Voting Scheme [J]. Computer Science, 2012, 39(7): 39-43. |
[4] | . [J]. Computer Science, 2006, 33(8): 113-117. |
[5] | YAO Qian, CHEN Shun ,XIE Li (Department of Computer Science, Nanjing University, Nanjing 210008). [J]. Computer Science, 2006, 33(2): 112-113. |
|