Content uploaded by Reihaneh Safavi-Naini
Author content
All content in this area was uploaded by Reihaneh Safavi-Naini on Dec 01, 2014
Content may be subject to copyright.
2. Registration.
3. Voting.
1. Preparation.
4 Opening.
It consists of two steps:
The signed ballot x is sent to all N candidates anonymously by voter Vi.
i
a.
c.
a.
i
b.
i
Voters send their encryption key to the counter anonymously.
Counter opens votes and counts them and announces the result.
b.
b.
Each candidate computes his/her partial cryptogram share on the signed
The counter computes all t of N combinations c and w to get the ballot
and z . If the majority of the ballot computed is the same and psuedo
identity z is valid then a roster of valid ballot is made and published.
i
i
jj
i
ballots and decrypted psuedo identities and then (c , w ) to the counter.
j
j
A trusted party generates N secret keys of the threshold encryption scheme
distributes the partial keys to the candidates and a corresponding key K to the
counter.
The voters’ pseudo identities decrypted by K and sent via an untraceable channel.
-1
-1
a. Voter V creates x and makes the message e
i
, that hidden ballot,
and sends it to A for A’s blind signature.
Administrator A signs the message e and sends the signature to the voter.
1
executes phase
x=B(v,k)
Ballot
prepares
VOTER: Administrator
executes phase
2
list of <ID,e,s>
registered voters
Publish m as a number of the
Broadcast channel
d=S (e) if a voter not already applied and eligible
A
<ID, e, s > where s =S(e) and e= X(x, r)
VOTER
COUNTER
CANDIDATES
VOTER:
:
Each candidate
C
C
C
C
1
2
N-1
N
i i
checks y A’
signature on ballot x
i
i
j
candidate.
COUNTER:
Anonymous channel
Broadcast channel
i
j
(z ,x y )
(z ,x y )
(x , y ).c .w
(x , y ).c .w
(z ,x y )
ii
i
ii
i
i
(z ,x y )
i i i
i i
i i
(x , y ).c .w
i i
i
1
1
2 2
N N
(x ,y )c
N-1
.w
N-1
(x , y ).c .w is sent to the counter.
i i j
j
(l , x , y )
i i
i
i
THEN it is valid
sends(z ,x ,y ) IF A’signature y =R (d ,r )
ELSE publish(x , y )
i i
’
’
’
’
’
’
IF signature is valid THEN
’
IF t out of N Combination of c
are equal and z is valid THEN
i i A i i
i
ELSE piblishes (z ,x y )
i i
Finally m
; the number of accepted ballots, is published by the
VOTER
COUNTER
j
Anonymous channel
opens ballot x
counts votes and publishes
the result
i
C
i-th
IF t out of N m = m (<= m ) and(x , y )
A
i
i
is in the list THEN send (l, k )
i