Abstract
In undeniable multi-signature scheme, a multi-signature can not be verified and disavowed without cooperation of all signers. The proposed voting scheme consists of four stages which are preparation, registration, voting and counting stages. Existing voting schemes assume that the voting center is trustful and untraceable channels are exist between voters and the voting center. To minimize the role of the voting center, the proposed scheme let multiple administrators to manage voting protocol. It also provides fair voting and counting stages. In voting and counting stages, a ballot can not be opened without help of all administrators. Before counting the ballot, they must confirm the undeniable multi-signature on it. Due to the undeniable property of the proposed scheme, voters can change their mind to whom they vote in registration stage. They can restart voting process by simply rejecting signature confirmation protocol launched by the voting manager.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on DiscreteLogarithms. IEEE Transactions on Information Theory IT-31(4), 469–472 (1985)
Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R.: A Secure Voting Protocol UsingThreshold Schemes. In: Proceedings of COMPSAC 1995, pp. 143–148 (1995)
Horster, P., Michels, M., Petersen, H.: Blind Multisignature Schemes and Their Relevance for Electronic Voting. In: Proceedings of COMPSAC 1995, pp. 149–155 (1995)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718. Springer, Heidelberg (1993)
Boyd, C.: A new multiple key cipher and an improved voting scheme. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 617–625. Springer, Heidelberg (1990)
Yun, S.H., Lee, S.J.: An electronic voting scheme based on undeniable signature scheme. In: Proceedings of IEEE 37th carnahan conference on Security Technology, pp. 163–167 (2003)
Chaum, D.: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Yun, S.H., Kim, T.Y.: Convertible Undeniable Signature Scheme. In: Proceedings of IEEE High Performance Computing ASIA 1997, pp. 700–703 (1997)
Yun, S.H., Lee, H.W.: The undeniable multi-signature scheme suitable for joint copyright protection on digital contents. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 402–409. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yun, SH., Lee, HW. (2005). The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_41
Download citation
DOI: https://doi.org/10.1007/11424826_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)