English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90453/105672 (86%)
Visitors : 14894799      Online Users : 348
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/6525


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/6525


    Title: An anonymous voting mechanism based on the key exchange protocol
    Authors: Chang, C. C.;Lee, J. S.
    Keywords: Election;Electronic voting;Anonymity;Blind signature;Key exchange
    Date: 2006-02
    Issue Date: 2009-12-17 14:58:27 (UTC+8)
    Publisher: Asia University
    Abstract: In democratic society, elections and voting are always the most important hallmarks. However, there are plenty of problems in the traditional election such as inconvenience, unfairness, non-mobility, non-anonymity, and so forth. What is more, the cost of the traditional election often places a heavy burden on the nation. To solve the problems of the traditional election, the concept of ?electronic voting? is introduced, where people are allowed to vote over the Internet and the government can save lots of money. The properties of mobility and convenience are the most significant reasons why people may adopt the electronic voting mechanism in the future. Although technologies for electronic voting have been developed for about 20 years, some problems, such as uncoercibility and completeness, still cannot be overcome. In this article, we are going to present an efficient and secure voting mechanism by employing Chaum's blind signature scheme and Diffie?Hellman key exchange protocol. Our proposed electronic voting mechanism not only achieves lots of essential requirements of general electronic voting schemes but also possesses better efficiency such that it can be the practical one.
    Relation: Computers and Security 25(4):307-314
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    0KbUnknown605View/Open
    310904400-6525.doc40KbMicrosoft Word258View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback