Liu Shengli, Yang Bo, Wang Yumin. A VOTING PROTOCOL BASED ON ELLIPTIC CURVE CRYPTOSYSTEMS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 84-89.
Citation:
Liu Shengli, Yang Bo, Wang Yumin. A VOTING PROTOCOL BASED ON ELLIPTIC CURVE CRYPTOSYSTEMS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 84-89.
Liu Shengli, Yang Bo, Wang Yumin. A VOTING PROTOCOL BASED ON ELLIPTIC CURVE CRYPTOSYSTEMS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 84-89.
Citation:
Liu Shengli, Yang Bo, Wang Yumin. A VOTING PROTOCOL BASED ON ELLIPTIC CURVE CRYPTOSYSTEMS[J]. Journal of Electronics & Information Technology, 2000, 22(1): 84-89.
A voting protocol is designed based on elliptic curve cryptosystems. This protocol enables each anonymous voter to vote on computer network, defends any cheat and makes secure elections possible.
Schneier B.Applied Cryptography,New York:John Whley Sons,Inc.,1994:125-137.[2]Stinson D R.Cryptography Theory and Practice,CRC Press,Inc.,1995:177-190.[3]Hoblitz N.A Course in Number Theory and Cryptography,Beijing:Springer-Verlag World Publish Corp,1990,150-l69.[4]MiyaJi A. A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves.[J].In K.Kim,T.Matusmoto (Eds.),Advances in Cryptology-ASIACRYPT96(Lecture、Nores in Computer Science),Berlin:Springer-Verlag.1996,:-[5]Desmedt Y,Frakel Y.Threshold Cryptosystems,In G.Brassard,editor,Advances in Cryptology,Proc.Of Crypto89(Lecture Notes in computer Science 435)、Berlin:Springer-Verlag:1990,307-315.