An Hierarchical Electronic Voting Scheme

Article Preview

Abstract:

The author presents a hierarchical electronic voting shceme for numerous voters. In the scheme,The administrator can separate those voters into a number of districts and designate a administrator and ballot inspector to manage voting and check ballot in every district, respectively. The districts are not divided into some smaller ones until those districts are moderate in size. The hierarchical electronic voting scheme works efficiently and meets the requirement for general electronic voting scheme.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 452-453)

Pages:

883-887

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chaum, D.L., Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the Acm, 1981. 24(2): pp.84-90.

DOI: 10.1145/358549.358563

Google Scholar

[2] Fujioka, A., T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. 1993: Springer.

Google Scholar

[3] Neff, C.A. A verifiable secret shuffle and its application to e-voting. 2001: ACM.

Google Scholar

[4] Lee, B. and K. Kim, Receipt-free electronic voting scheme with a tamper-resistant randomizer. Information Security and Cryptology¡ªICISC 2002, 2003: pp.389-406.

DOI: 10.1007/3-540-36552-4_27

Google Scholar

[5] Adida, B. and C.A. Neff. Ballot casting assurance. 2006: USENIX Association.

Google Scholar

[6] Chaum, D. and U. o.N. u.T.C. Science, Secret ballot elections with unconditional integrity. 2007: Citeseer.

Google Scholar

[7] Delaune, S., S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security, 2009. 17(4): pp.435-487.

DOI: 10.3233/jcs-2009-0340

Google Scholar

[8] Boneh, D. and M. Franklin. Identity-based encryption from the Weil pairing. in CRYPTO 2001. 2001: Springer.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[9] Boneh, D., X. Boyen, and E.J. Goh, Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology¨CEUROCRYPT 2005, 2005: pp.440-456.

DOI: 10.1007/11426639_26

Google Scholar

[10] Delerablée, C., P. Paillier, and D. Pointcheval, Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. Pairing-Based Cryptography¨CPairing 2007, 2010: pp.39-59.

DOI: 10.1007/978-3-540-73489-5_4

Google Scholar