题名

新型態之電子投票機制設計

并列篇名

New E-Voting Mechanism Design

DOI

10.6188/JEB.2017.19(1).02

作者

蘇品長(Pin-Chang Su);葉昱宗(Yui-Chong Yeh)

关键词

電子投票 ; 代理盲簽章 ; 多文件簽密法 ; E-voting ; proxy blind signature ; multi-document signcryption

期刊名称

電子商務學報

卷期/出版年月

19卷1期(2017 / 06 / 01)

页次

29 - 50

内容语文

繁體中文

中文摘要

網際網路的普及,改變了傳統的生活方式與行為模式,便利的同時也帶出了許多網路安全的課題。以應用於電子投票為例,已有許多國家致力於在電子投票發展,以降低傳統選舉所耗費之社會資源。安全評估一直是無法滿足的議題,因此,如何達到更具有效率且安全的防護設計,同時擁有代理的即時性與合乎匿名投票原則的機制為研究重點。本研究以植基於橢圓曲線密碼系統的快速運算為基礎,利用代理盲簽章的盲化特性與代理特性,提出多份電子選票執行一次簽密的方法,可增加密文破解難度,提升整體運算過程中的效率及安全的防護,此新型態設計更適用於未來多合一選舉之電子化投票機制參考。

英文摘要

The popularity of Internet has altered the traditional way of life and behavioral patterns. Indeed, while the Internet has brought great convenience, it has also highlighted numerous issues for network security. Many countries are committed to the development of e-voting, which would help societies reduce the amount of resources allocated for traditional elections. However, most literatures exploring the signature mechanisms of electronic elections only address research and technology pertaining to the single voting scheme and single blind signature mechanism. Further, these electoral processes typically exploit only blind signature rather than encryption. This research focuses on the implementation of the Elliptic Curve Cryptosystem and its capacity to generate computations rapidly as its foundation. The properties of blind signature and proxy signature in proxy blind signature are engaged to facilitate the signcyrption of multiple ballots simultaneously. It further harnessed the avalanche effect in the design of encryption to increase the difficulty of deciphering ciphertext. In all, these designs, which enhance the overall efficiency and security of the e-voting system, would be applicable to an e-voting mechanism that features multiple and varied polls in the future.

主题分类 人文學 > 人文學綜合
基礎與應用科學 > 資訊科學
基礎與應用科學 > 統計
社會科學 > 社會科學綜合
参考文献
  1. Alghazzawi, D. M.,Salim, T. M.,Hasan, S. H.(2011).A new proxy blind signature scheme based on ECDLP.International Journal of Computer Science Issues,8(3),73-79.
  2. Chaum, D.(1982).Blind signatures for untraceable payments.Advances in Cryptology,New York:
  3. Delaune, S.,Kremer, S.,Ryan, M.(2006).Coercion-resistance and receipt-freeness in electronic voting.Proceedings of the 2006 IEEE 19th Computer Security Foundations Workshop (CSFW),Los Alamitos, California:
  4. Fan, K.,Wang, Y.,Li, H.(2012).A new proxy blind signature scheme.International Journal of Grid and Utility Computing,3(1),38-42.
  5. Hu, L.,Zheng, K.,Hu, Z.,Yang, Y.(2009).A secure proxy blind signature scheme based on ECDLP.International Conference on Multimedia Information Networking and Security
  6. Lal, S.,Awasthi, A.(2003).Proxy blind signature scheme.Journal of Information Science and Engineering
  7. Lin, W.,Jan, J.(2000).A security personal learning tools using a proxy blind signature scheme.International Conference on Chinese Language Computing,Illinois, USA:
  8. Lu, R.,Cao, Z.,Zhou, C.(2005).Proxy blind multi-signature scheme without a secure channel.Applied Mathematics and Computation,164(1),179-187.
  9. Mambo, M.,Usuda, K.,Okamoto, E.(1996).Proxy signatures for delegating sign operation.Proceeding of the 3rd ACM conference on computer and communications security (CCS96),New York, NY, USA:
  10. Mateu, V.,Sebe, F.,Valls, M.(2014).Constructing credential-based E-voting systems from offline E-coin protocols.Journal of Network and Computer Applications,42,39-44.
  11. Pradhan, S.,Mohapatra, R.(2011).Proxy blind signature scheme based on ECDLP.International Journal of Engineering Science & Technology,3(3),2244-2248.
  12. Qin, H. S.,Zhang, L.,Feng, Y.,Wu, W.,He, C.(2013).Design of randomized proxy blind signcryption scheme without pairing computing.Computer Engineering,39(4),169-173.
  13. Sun, H.,Hsieh, B.,Tseng, S.(2005).On the security of some proxy blind signature schemes.The Journal of Systems and Software,74(3),297-302.
  14. Tan, Z.,Liu, Z.,Tang, C.(2002).Digital proxy blind signature schemes based on DLP and ECDLP.MM Research Preprints,21,212-217.
  15. Tian, Y.,Chen, H.,Yan, G.,Tian, J.,Wen, X.(2013).A proxy blind signature scheme based on quantum entanglement.Optical and Quantum Electronics,45(12),1297-1305.
  16. Wang, C.,Liao, M.(2014).Security Analysis and Enhanced Construction on ECDLPBased Proxy Blind Signature Scheme.International Journal of e-Education, e-Business, e-Management and e-Learning,4(1),47-51.
  17. Wang, H.,Wang, R.(2005).A proxy blind signature scheme based on ECDLP.Chinese Journal of Electronics,14(2),281-284.
  18. Wang, R.,Juang, W.,Lei, C.(2008).A Web Metering Scheme for Fair Advertisement Transactions.International Journal of Security and its Applications,2(4),49-55.
  19. Yang, X.,Yu, Z.(2008).Security analysis of a proxy blind signature scheme based on ECDLP.Proceedings of 4th International Conference on Wireless Communications, Networking and Mobile Computing,Dalian, China:
  20. Zhang, F.,Kim, K.(2003).Efficient ID-based blind signature and proxy signature from bilinear pairings.Proceedings of ACISP,Wollongong, Australia:
  21. Zheng, Y.(1997).Digital signcryption or How to achieve cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption).Advances in Cryptology-Crypto,Berlin:
  22. 丘昌泰(2004)。從各國電子投票經驗看我國選務的改革方向。研考雙月刊,28(4),25-35。
  23. 許建隆、吳宗成(1999)。簽章加密法及其應用。資訊安全通訊,6(1),33-41。
  24. 曾貴華(2010)。量子保密通信。台北市:高等教育出版社。
  25. 覃海生、張雷、馮燕強、吳文俊、何傳波(2013)。無對運算的隨機代理盲簽章方案設計。計算機工程,39(4),169-173。
  26. 蘇品長、楊倫青、王博彥(2014)。植基於橢圓曲線之多重盲簽密機制。資訊管理研究,14,73-94。
被引用次数
  1. 劉嘉薇(2019)。我國推動電子投票的契機、挑戰與未來。臺灣民主季刊,16(1),155-162。
  2. 莊文忠(2021)。科技促進民主?民眾對推動電子投票與民主發展的關聯性分析。臺灣民主季刊,18(1),83-140。
  3. (2024)。電腦資料交換之實體隔離機制探討-植基於身分驗證之USB存取管控研究。資訊管理學報,31(1),93-121。