Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting

碩士 === 國防大學 === 資訊管理學系 === 104 === With the digital era and the rapid development of the Internet, replacing various entities service by using network services is very common. Take elections for example, some countries in the world have implemented I-voting for public officials. If I-voting can be i...

Full description

Bibliographic Details
Main Authors: Huang, Chun-Chieh, 黃俊傑
Other Authors: Su, Pin-Chang
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/dtdk8h
id ndltd-TW-104NDU00654004
record_format oai_dc
spelling ndltd-TW-104NDU006540042019-05-15T22:25:52Z http://ndltd.ncl.edu.tw/handle/dtdk8h Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting 適用於網路電子投票之安全機制設計-以軍人不在籍投票為例 Huang, Chun-Chieh 黃俊傑 碩士 國防大學 資訊管理學系 104 With the digital era and the rapid development of the Internet, replacing various entities service by using network services is very common. Take elections for example, some countries in the world have implemented I-voting for public officials. If I-voting can be implemented in Taiwan, the problem of the military personnel who long-term work outside return home inconvenience will be resolved. However, Taiwan has not yet to implement it. One of the reasons is safe. A voting system must have the function to prevent unscrupulous people false voting and ballot tampering. Moreover, multi-in-one election has become a trend in Taiwan. If I-voting can be implemented, the electoral center will be required to sign a large number of ballot papers, and cause great burden on the voting system. How to achieve anonymous vote and design system safe and efficient is the focus of this study. Therefore, we design an I-voting mechanism with adequate security and practicality by using theoretical basis of the elliptic curve cryptography system, multiple files blind signature and others. That mechanism could make soldiers in the camp complete the vote by the Internet. Moreover, we provide the same security level with shorter key lengths than comparable other public-key cryptosystems. And a signer can sign a number of documents at once to shorten unnecessary processes and reduce system burden. We believe that our study can help Taiwan to achieve I-voting early. Su, Pin-Chang Tsai, Chien-Hua 蘇品長 蔡建華 2015 學位論文 ; thesis 91 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學 === 資訊管理學系 === 104 === With the digital era and the rapid development of the Internet, replacing various entities service by using network services is very common. Take elections for example, some countries in the world have implemented I-voting for public officials. If I-voting can be implemented in Taiwan, the problem of the military personnel who long-term work outside return home inconvenience will be resolved. However, Taiwan has not yet to implement it. One of the reasons is safe. A voting system must have the function to prevent unscrupulous people false voting and ballot tampering. Moreover, multi-in-one election has become a trend in Taiwan. If I-voting can be implemented, the electoral center will be required to sign a large number of ballot papers, and cause great burden on the voting system. How to achieve anonymous vote and design system safe and efficient is the focus of this study. Therefore, we design an I-voting mechanism with adequate security and practicality by using theoretical basis of the elliptic curve cryptography system, multiple files blind signature and others. That mechanism could make soldiers in the camp complete the vote by the Internet. Moreover, we provide the same security level with shorter key lengths than comparable other public-key cryptosystems. And a signer can sign a number of documents at once to shorten unnecessary processes and reduce system burden. We believe that our study can help Taiwan to achieve I-voting early.
author2 Su, Pin-Chang
author_facet Su, Pin-Chang
Huang, Chun-Chieh
黃俊傑
author Huang, Chun-Chieh
黃俊傑
spellingShingle Huang, Chun-Chieh
黃俊傑
Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting
author_sort Huang, Chun-Chieh
title Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting
title_short Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting
title_full Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting
title_fullStr Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting
title_full_unstemmed Design of Security Mechanism for I-Voting-A Case Study of Military Absentee Voting
title_sort design of security mechanism for i-voting-a case study of military absentee voting
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/dtdk8h
work_keys_str_mv AT huangchunchieh designofsecuritymechanismforivotingacasestudyofmilitaryabsenteevoting
AT huángjùnjié designofsecuritymechanismforivotingacasestudyofmilitaryabsenteevoting
AT huangchunchieh shìyòngyúwǎnglùdiànzitóupiàozhīānquánjīzhìshèjìyǐjūnrénbùzàijítóupiàowèilì
AT huángjùnjié shìyòngyúwǎnglùdiànzitóupiàozhīānquánjīzhìshèjìyǐjūnrénbùzàijítóupiàowèilì
_version_ 1719130641147101184