透過您的圖書館登入
IP:13.59.236.219
  • 期刊

新型態之電子投票機制設計

New E-Voting Mechanism Design

摘要


網際網路的普及,改變了傳統的生活方式與行為模式,便利的同時也帶出了許多網路安全的課題。以應用於電子投票為例,已有許多國家致力於在電子投票發展,以降低傳統選舉所耗費之社會資源。安全評估一直是無法滿足的議題,因此,如何達到更具有效率且安全的防護設計,同時擁有代理的即時性與合乎匿名投票原則的機制為研究重點。本研究以植基於橢圓曲線密碼系統的快速運算為基礎,利用代理盲簽章的盲化特性與代理特性,提出多份電子選票執行一次簽密的方法,可增加密文破解難度,提升整體運算過程中的效率及安全的防護,此新型態設計更適用於未來多合一選舉之電子化投票機制參考。

並列摘要


The popularity of Internet has altered the traditional way of life and behavioral patterns. Indeed, while the Internet has brought great convenience, it has also highlighted numerous issues for network security. Many countries are committed to the development of e-voting, which would help societies reduce the amount of resources allocated for traditional elections. However, most literatures exploring the signature mechanisms of electronic elections only address research and technology pertaining to the single voting scheme and single blind signature mechanism. Further, these electoral processes typically exploit only blind signature rather than encryption. This research focuses on the implementation of the Elliptic Curve Cryptosystem and its capacity to generate computations rapidly as its foundation. The properties of blind signature and proxy signature in proxy blind signature are engaged to facilitate the signcyrption of multiple ballots simultaneously. It further harnessed the avalanche effect in the design of encryption to increase the difficulty of deciphering ciphertext. In all, these designs, which enhance the overall efficiency and security of the e-voting system, would be applicable to an e-voting mechanism that features multiple and varied polls in the future.

參考文獻


丘昌泰(2004)。從各國電子投票經驗看我國選務的改革方向。研考雙月刊,28(4),25-35。
Chaum, D. (1982). Blind signatures for untraceable payments. Advances in Cryptology (3rd ed.). New York: Springer Science + Business.
Delaune, S., Kremer, S., & Ryan, M. (2006). Coercion-resistance and receipt-freeness in electronic voting. Proceedings of the 2006 IEEE 19th Computer Security Foundations Workshop (CSFW), Los Alamitos, California.
Fan, K., Wang, Y., & Li, H. (2012). A new proxy blind signature scheme. International Journal of Grid and Utility Computing, 3(1), 38-42.
Hu, L., Zheng, K., Hu, Z., & Yang, Y. (2009). A secure proxy blind signature scheme based on ECDLP. International Conference on Multimedia Information Networking and Security, DOI 10.1109/MINES.2009.220.

延伸閱讀