Verifiable post quantum electronic voting system and implementation method thereof

An electronic and quantum technology, applied in the field of information security, can solve problems such as being unable to resist quantum computer attacks and unable to verify the legitimacy of votes

Active Publication Date: 2018-09-04
SOUTH CHINA UNIV OF TECH
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing online voting schemes either use traditional encryption schemes such as Paillier, or cannot resist quantum computer attacks, or cannot verify the legitimacy of ballots in the ciphertext state, so they are both secure and functional. there is a big problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifiable post quantum electronic voting system and implementation method thereof
  • Verifiable post quantum electronic voting system and implementation method thereof
  • Verifiable post quantum electronic voting system and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0127] like figure 1 As shown, a verifiable post-quantum electronic voting system includes an authentication center, a client, a verification server, a vote counting server, a verification program, and a bulletin board;

[0128] The authentication center is used to verify the identity of the user, and generates an identity ID for each legal user and signs it; the authentication center includes an identity ID generation module and a signature module, and is provided with a public and private signature module. key pair;

[0129] The user end proves its identity to the authentication center, receives the identity ID signature, encrypts its own ballot, and sends the ballot ciphertext and the identity ID signature to the verification server; the user end includes a ballot plaintext generation module and an encryption module; when starting to vote, the user first sends his own identity certificate to the authentication center, and obtains his ID signature after the authentication i...

Embodiment 2

[0145] A verifiable implementation of a post-quantum electronic voting system such as figure 2 The voting process shown includes the following steps:

[0146] S1, the system initialization step, this step is specifically:

[0147] S11. Select and generate public parameters; select LWE encryption system parameters n, l, q, α, and homomorphic vote counting upper limit VHom max , where n is the security parameter of the LWE encryption system; l is the length of the ballot plaintext string, representing the number of candidates; q represents the modulus, since the homomorphic operation is a finite field operation, the operation result should be modulo q operation, α It is a parameter used in Gaussian sampling, which is related to the square difference of sampling; VHom max Indicates the maximum number of times that VSA can perform homomorphic addition operations for each partial homomorphic vote counting;

[0148] S12. According to the public parameters, generate the public-pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable post quantum electronic voting system and an implementation method thereof. The system comprises an authentication center, a user side, a verification server, a vote counting server, a verification program and a notice board; the authentication center verifies identity of users, generates identity ID for each legal user and signs for the identity ID; the user side proves own identity to the authentication center, receives an identity ID signature, encrypts own votes and sends a votes ciphertext and the identity ID signature to the verification server; the verification server comprises two servers, and the two servers jointly complete verification of legality of the votes and a dynamic vote counting work; the vote counting server decrypts some dynamic vote counting ciphertext and publishes the decrypted dynamic vote counting ciphertext on the notice board; and the verification program verifies whether the vote counting server performs vote counting correctly. The system and the implementation method thereof, provided by the invention, can effectively resist attacks of a quantum computer and have excellent computation efficiency.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a verifiable post-quantum electronic voting system and its implementation method. Background technique [0002] With the rapid development and popularization of information technology, more and more needs can be realized through the Internet, one of which is online voting. Statistics show that the convenience and speed of online voting can increase the enthusiasm and participation of the public, and to a certain extent, help promote the democratization process. In addition, online voting also has the advantages of low cost, low human error rate, and high vote counting efficiency. It has gradually been accepted by people, and some countries and regions are also trying to use online voting systems for some elections. [0003] While online voting brings great convenience to people, it also faces many challenges. With the continuous improvement of people's awareness of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L9/00G07C13/00
CPCG07C13/00H04L9/008H04L9/0869H04L9/3247H04L63/08H04L63/0876G06Q10/10G06Q30/0185G06Q50/265H04L9/3093H04L9/321H04L9/3263H04L63/04H04L63/0823H04L2209/463G06Q2220/00G06Q2230/00H04L9/0618H04L9/3073H04L9/3268
Inventor 吴宸唐韶华
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products