Research on Network Voting System Based on Conditional Entropy and Point-Including Protocol

Article Preview

Abstract:

In the high speed development today, the use of the Internet has penetrated into all areas of life, with the increase of the number of internet users, much of word can be started on the internet. Takes a great deal of field in the process of large-scale ballot, is very complicated for the organization of elections. It is very complicated for the organization to occupy a large-scale land for a big election. But this will be convenient on the internet, so it can be applied to the big election. Based on the point includes protocol, this paper established the mathematical model of anonymous conditional entropy. Finally designing a electronic voting system based on the realization process of political democracy, which also test the anonymity of the system, and providing a theory reference for the democratic process on the network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1860-1863

Citation:

Online since:

November 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chun Liu, Jianxue Zhang. Explore the application of RFID technology in electronic voting [J]. Computer science, 2011, 38(10A): 440-443.

Google Scholar

[2] Weidong Ji. The formal and substantive legal procedures[J]. [J]. Journal of Peking University (PHILOSOPHY AND SOCIAL SCIENCES EDITION) , 2012, (1) : 103-105.

Google Scholar

[3] Cheng Liu. Procedure of democracy: Democracy break within the Party [J]. Jounal of Party School of CPC Qingdao, 2012( 01): 89-90.

Google Scholar

[4] Qingping Xiang. Review and Suggestion: the research on domestic network political participation [J]. Journal of Party School of CPC Hangzhou, 2012 (4): 57-58.

Google Scholar

[5] Zaixing Zhang. Study on the ideology and political education of network [M]. Beijing Economic Science Press, 2011: 67-78.

Google Scholar

[6] Mingsheng N. Democracy latitudes considering of political blog [J]. Tianjin Institute of public administration, 2011 (1): 29-30.

Google Scholar

[7] Hailong Zheng. Jianwei Liu: The analysis and research on one-time password authentication mechanism [J]. Information and Communication security, 2012, (11): 64-66.

Google Scholar

[8] Chunzhi Wang, Hao Tang. Model and implementation of one-time password mechanism. Science Educ, 2011, (2): 187-188.

Google Scholar

[9] Hong Zhong, Liusheng Huang, Yonglong Luo. Jury scheme of practical electronic [J]. Micro computer system, 2011, 43 (1): 178 – 181.

Google Scholar

[10] Jiwu Jing, Jingkeng Lin, Dengguo Feng. PKI Technology (State Key Laboratory of information security technology, information security) [M]. Science Press, 2011: 89-92.

Google Scholar

[11] Yonglong Luo, Liusheng Huang, Weiwei Jing, Weijiang Xu, Guoliang Chen. The cross protocol and its application of protection of private information [J]. Chinese Journal of computer, 2011, 30 (2): 112-113.

Google Scholar

[12] Pengzhi Tang. One-time password authentication technology based on SHA [J]. Journal of East China Jiaotong University, 2012, (2): 55-59.

Google Scholar