跳到主要內容

臺灣博碩士論文加值系統

(44.200.82.149) 您好!臺灣時間:2023/06/02 17:00
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:楊生榮
研究生(外文):Z.L.Yang
論文名稱:具完整監督之無記名電子投票實作
論文名稱(外文):The Implementation of Anonymous Voting with a Complete Supervision
指導教授:詹進科詹進科引用關係
指導教授(外文):Jinn-Ke Jan
學位類別:碩士
校院名稱:國立中興大學
系所名稱:應用數學系
學門:數學及統計學門
學類:數學學類
論文種類:學術論文
論文出版年:1999
畢業學年度:87
語文別:中文
論文頁數:62
中文關鍵詞:電子投票數位簽章公開金鑰分配
外文關鍵詞:electronic electiondigital signaturepublic key distrbution
相關次數:
  • 被引用被引用:2
  • 點閱點閱:156
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
傳統紙張投票方法,如果結合電腦與網際網路,將帶來更多的便利,而且也可能使人們參與投票的意願增高,另外在成本上的花費也會小於傳統紙張投票。不過透過網路來進行投票較傳統紙張投票方法有更多的資訊安全議題需要考量。
本論文主要是在PC的環境下,透過網際網路來實作具監督無記名之電子投票。並且就這方面提出在設計與實作時的問題探討與分析。
It is more convenient that the traditional voting can be implemented with computer in Internet. The cost for the electronic voting system is lower if compare with the traditional paper voting system and electronic voting also can be a good solution on increasing the participation of voters. Whereas, some issues on information’s securities must be carefully considered.
In this thesis, we implement anonymous voting system with a complete supervision at the PC’s environment. Moreover, we also try to solve the problems that we found during the process of the system design. Finally, we discuss some practical matters and conclude proposal.
中文摘要………………………………………………………………..Ⅰ
英文摘要………………………………………………………………..Ⅱ
誌謝……………………………………………………………………Ⅲ
目錄…………………………………………………………………….Ⅳ
第一章 緒論…………………………………………………………….1
1. 1研究背景與動機…………………………………………………...1
1.1.1 研究背景…………………………………………………...1
1.1.2 研究動機…………………………………………………2
1.2 研究目的…………………………………………………………….4
1.3 論文架構…………………………………………………………….4
第二章文獻討論……………………………………………….5
2. 1相關協定文獻討論…………………………………………………5
2.2.1集中式……………………………………………………….5
2.2.2非集中式…………………………………………………….7
2.2 相關技術文件討論………………………………………………….8
第三章 理論協定介紹………………………………………13
3.1 Diffie-Hellman公開金匙分配系統……………………………….13
3.2 Nyberg-Rupple 簽章法……………………………………………15
3.3具有完全監督制度的無記名電子投票系統的基礎理論………..17
3.3.1選舉機構之安全核心建立………………………………...19
3.3.2選舉人名冊的建立………………………………………20
3.3.3投票的第一階段─驗證…………………………………..21
3.3.4 投票的第二階段---投票…………………………………26
3.3.5 投票的第三階段--- 開票…………………………………27
第四章 系統實作……………………………………………29
4.1 系統開發的環境………………………………………………….29
4.2系統開發的工具…………………………………………………..29
4.3實作系統的架構…………………………………………………..30
4.3.1身份驗證中心系統………………………………………..31
4.3.2監票中心系統……………………………………………...32
4.3.3計票中心…………………………………………………...33
4.3.4客戶端程式………………………………………………34
第五章 結論及未來發展方向……………………………….35
5.1 已完成的工作…………………………………………………….35
5.2 未來可以改進的地方…………………………………………..36
5.3 結論………………………………………………………………37
6 文獻參考………………………………………………..38
附錄一 操作畫面………………………………………………………46
[AMI] T.Asano,T. Matsumoto, and H. Imai,”A Study on Some Schemes for Fair Electronic Secrete Voting”,Proceeding of the 1991 Symposium on Crytptography and Information Security,Japanese,SCI91-12A,February,1991.
[Bo1] C.Boyd,”Some Application of Multiple Key Ciphers”,Advances in Cryptology-EUROCRYPT’88 Proceedings,Springer-Verlag,1989,pp.455-467.
[Bo2] C.Boyd,”A New Multiple Key Cipher and an Improved Voting Scheme”,Advances in Cryptology-EUROCRYPT’89 Proceedings,1990,pp.617-625.
[BR] J.Borrel and J Rifa,”An Implementable Secure Voting Scheme”,Computers&Security,Vol.15,No.4,1996,pp.327-338.
[BT] J. Benaloh and D. Tuinstra,”Receipt Free Secret Ballot Elections”,Preceedings of the 26th Annual ACM Symposium on the Theory of Computing,1994,pp.544-553.
[BY] J. Benaloh and M Yung, “Distribute the Power of a Government to Enhance the Privacy of Voters”,Proceeding
[Ch1] D.Chaum,”Untraceable Electronic Mail,Return Address and Digital Pseudonyms” Communications of the ACM , Vol.24 ,No.2, February, 1981,pp.84-88.
[Ch2] D.Chaum,”Blind Signature for Untraceable Payments”,Advances in Cryptology-CRYPTO’82 Proceedings,1983,pp.199-203
[Ch3] D.Chaum,”Security without Identification:Transaction Systems to Make Big Brother Obsolete”,Communications of the ACM, Vol.28, No.10, October,1985,pp1030-1044.
[Ch4] D.Chaum,”Blinding for Unanticipated Signatures”,Advances in Cryptology-EUROCRYPTO’87 Proceedings,Springer-Verlag,1988,pp227-233.
[Ch5] D.Chaum ,”Privacy Protected Payments:Unconditional Payer and/or Payee Untraceability”,Smart Card 2000,Norht-Holland,1988.
[Ch6] D.Chaum,”Election with Unconditionally —Secrete Ballots and Disruption Equivalent to Breaking RSA”,Advances in Cryptology-EUROCRYPTO’88 Proceedings,Springer-Verlag,1989,pp.177-182.
[Co1] J.D.Cohen,”Improving Privacy in Cryptographic Elections”,Yale University Computer Scinence Department Technical Report YALEU/DCS/TR-454,February,1986.
[CCD] D.Chaum,C.Crepeau, and I. B. Damgrad, “Multiparty Unconditionally Secure Protocols”, Proceedings of the 20tth ACM Symposium on Theory of Computing,1988
[CDG] D.Chaum,I. B. Damgrad, and J. van de Graaf, “Multiparty Computation Ensuring Privacy of Each Paryt’s Input and Correctness of the Result “, Advances in Crytptology-CRYPTO’87 Proceedings,1988,pp.87-119
[CE] D.Chaum and J. H. Evertse, “A secure and Privacy protecting Protocol for Transmitting Personal Information Between Organizations”,Advances in Cryptology. CRYPTO’86 Proceedings Springer-Verlag,1987, pp118-167
[CF] J.D. Cohen and M.J. Fisher,” A Robust and Verifiable Cryptographically Secure Election Scheme “ , Proceedings of the 26th IEEE Symposium on Foundations of Computer Science,1985, pp. 372-382
[CFSY] R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung,” Multi-Authority Secret-Ballot Elections with Linear Work” Advance in Cryptology- EUROCRYPT’96 Proceedings Springer-Verlag,1997,pp.72-83.
[CJ] Y.Y. Chen and J. K. Jan,”Paramita Wisdom” Password Authenication Scheme without Verification Tables”,ti appear in The Journal of System and Software,1997
[DA] W. R. Delone and E. R. Alexander “Techology Supported Anonymous Voting and Large Group Participation: An Examperimental Study”Journal of Information Techology Management,Vol.2 No3.,1991
[FL] C. I. Fan and C. L. Lei,”A Multi-Recastable Ticket Scheme for Electronic Elections”, Advance in Cryptology. ASIACRYPTO’96 Proceedings, Springer —Verlag,1997,pp.116-124.
[FOO] A.Fujioka, T. Okamoto, and K. Ohta ,”A Practical Secure Voting for Electronic Elections”,Advance in Cryptology-ASIACRYPT’96 Proceedings,Springer-Verling ,1997,pp.116-124.
[HK] L.Harn and T.Kiesler,” How to Hold an Election over Computer Network”,Workshop on Information Security& Modern Cryptography, Taiwain, R.O.C.,1991,pp.129-138.
[HY] J.J Hwang and C. Yang,”An Anonymous Electronic Voting System on the Computer Network”,Proceeding of the 4th National Information Security Conference Taiwan R.O.C,1994,pp.113-120.
[HYLN] J.J. Hwang,C. Yang, M. H. Lin, J.L. Neih, and K. C. Wu,”Extension &Discussion of an Anonymous Voting System”,Proceeding of the 6th National Inforamtion Security Conference,Taiwan, R.O.C.,1996,pp.161-170.
[IV] K. R. Iversen, “A Cryptographic Scheme for Computerized General Elections”,Advance in Cryptographic —CRYPTO’91 Proceedings Springer-Verlag,1992,pp.405-419
[JC] J.K. Jan,Y.Y. Chen,”網路社會之密碼學應用之研究”,國立中興大學,博士論文,民國87年
[JL1] W. S. Juang and C. L. Lei,” A Collision-Free Secret Ballot Protocol for Computerized General Elections” Computers& Security,Vol.15,NO.4, 1996,pp339-348.
[JL2] W. S. Juang and C. L. Lei, “A Collision Free Secret Ballot Procotol for Computerized General Elections” Computers& Security,Vol.15, No.4,1996,pp339-348.
[JLF1] W. S. Juang, C. L Lei and C. I. Fon,”A Collision Free Secret Ballot Protocol for Computerized Gerneral Elections”,International Conputer Symposium,Taiwan. R.O.C,1994,pp.309-314.
[JLF2] W. S. Juang, C. L. Lei and C. I. Fan.”A Secure and Pratical Electronic Voting Scheme for Real World Environments”, Proceeding of the 6th National Inforamtion Security Conference, Taiwain R.O.C 1996. pp.158-160
[JT] J.K.Jan and C.C. Tai,”A Secure Electronic Voting Protocol with IC Cards” to appear in The Journal of Systems and Software,1997.
[K] J.S.A.Kapp,”RSAEURO”,April 22,1995,
ftp://ftp.dsi.unimi.it/pub/security/crypto/rsaeuro.zip
[KLH] C.J.Kuo, C.F. Lee,and J.J Hwang,”An Anonymous-Voting Protocol with Electronic Bulletin Board”,Proceedings of the 4 th National Information Security Conference, Taiwan , R.O.C,1994, pp25-37.
[LH] M.H Lin, J.J Hwang,”網際網路秘密投票之研究”,國立交通大學,博士論文,民國87年
[Me] M.Merrit,” Cryptographic Protocols”,Ph. D. diss Georia Indtitute of Technology, GIT-ICS-83/6,February,1983.
[MH] M.Michels and P Horster,”Some Remark on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme”,Advance in Cryptology-ASIACRYPT’94 Proceedings, Springer-Verlag,1995,pp.164-170.
[NHY] J.L Nieh,J.J.Hwang,C.Yang,”應用於群體決策的無記名投票系統” ,國立交通大學,碩士論文,民國85年
[NSS] H. Nurmi,A Salomaa,and L. Santean,”Secret Ballto Elections in Computer Networks”,Computers&Security,Vol.10,No.6,1991, pp.553-560.
[ODBC] http://www.rdec.gov.tw/secr/ipcs-h1/3.htm
[Oh] K Ohta, “A Electrical Voting Scheme Using a Single Administrator”, 1988 Spring National Convention Record,IEICE,Japanese,A-294,March,1988.
[PCLL] S.F.Pon, T. Chang, E. H. Lu, and J. Y. Lee,”An Anonymous Electronic Voting Protocol”, Proceedings of the 6th National Information Security Conference, Taiwan. R.O.C.,1996. pp . 171-177.
[PIK] C.Park, K Itoh, and K. Kurosawa, “Efficient Anonymous Channel and All /Nothing Election Schene”,Advances in Cryptology-EUROCRYPT’93 Proceedings,Springer-Verlag,1994,pp.248-259.
[RBR] A. Riera, J. Borrell , and J Rifa,”Large Scale Elections by Coordinating Electoral Colleges”,IFIP SEC’97 Proceedings,Chapman&Hall,1997,pp.349-362.
[S] Salomaa, A. Verifying and recasting secret ballots in computer networks. In New Results and New Trends in Computer Science Springer-Verlag, Berlin. 1991, pp. 283-289.
[Sa1] K.Sako, “Electronic Voting Scheme Allowing Open Objection to The Tally”,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences ,Vol.E77-A,No.1,Jan,1994, pp.24-30.
[Sa2] R.Saltman,” Accuracy Integrity and Security in Computerized Vote-tallying”,Communications of the ACM,Vol.31,No.10,1988,pp1184-1191.
[Sl] P.H. Slessenger,”Socially Secure Cryptograophic Election Scheme”,Electronics Letters,Vol.27,No.11,May,1991,pp.955-957.
[SK1] K. Sako and J. Kilian, “Secure Voting Using Partially Compatible Homomorphisms”, Advances in Cryptology CRYPTO’94 Proceeding,Springer-Verlag,1995,pp.411-424.
[SK2] K. Sako and J. Kilian,” Receipt-Free Mix-Type Voting Scheme”, Advances in Cryptology-EUROCRYPT’95 Proceedings,Springer-Verlag,1996,pp.393-403.
[SS] A. Salomaa and L. Santean,” Secret Selling of Secrets with Many Buyers”,EATCS Bull, Vol.10,1990,pp178-186.
[WC] W.B.Wu and C.C.Chang,” A Secure Voting System on a Public Network”,M.S. thesis, National Chung Cheng Unviersity Taiwan,ROC,1994.
[W] J. M Wing ”Electronic Election and Auction”15-827 Security and cryptography Lecture 8
http: //www.cs.cmu.edu/afs/cs/academic/class/15827-f98/ www / lectures.html.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top