Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks

A proxy key and malicious attack technology, which is applied in the field of electronic voting servers, can solve problems such as leakage of private key signatures of voting participants, affecting voting fairness, modification of votes, etc., and achieves high efficiency

Active Publication Date: 2019-05-24
HUBEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many problems in this kind of scheme: (1) Voters send voting information directly to the voting server. If the voting server is attacked maliciously, the number of votes may be modified, which directly affects the fairness of voting; (2) ) Sign everyone's vote on the server to avoid vote swiping. Although this method can avoid swiping votes, if the server is attacked maliciously, the signature private key of the voting participant will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks
  • A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks
  • A Proxy Key Confusion Electronic Voting System and Method Against Malicious Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0046] please see figure 1 , figure 2 and image 3 A kind of anti-malicious attack proxy key confusion electronic voting system provided by the present invention includes a proxy voting program module and a voting information verification module; the proxy voting program module includes a preprocessing parameter generation unit, a signature private key encryption unit, and an obfuscation program unit , voting information output unit; the voting information verification module includes a voting result receiving unit, a decryption unit, and a voting informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an anti-malicious attack proxy secret key mixing-based electronic voting system and method. The system comprises a proxy voting program module and a voting information verification module. The proxy voting program module comprises a pre-processed parameter generation unit, a signature private key encryption unit, a mixing program unit, and a voting information output unit. The information verification module comprises a voting result receiving unit, a decoding unit, and a voting information verification unit. The system has the characteristics of low complexity, high security, and simplicity in verification. The system and method are applicable to an electronic voting server that is likely to be attacked maliciously. Even if the voting server suffers malicious attack, whether invalid votes exist can be found (each voter signs on his own vote, and a notary can find out ballot rigging), and a hacker cannot acquire signature private key information of the voter from the attacked electronic voting server.

Description

technical field [0001] The present invention relates to the field of data security, in particular to an electronic voting server. Taking electronic voting as an object, combining cryptography technology with cloud computing and cloud storage, the electronic voting server is used to sign electronic voting and prevent the electronic voting server from being maliciously attacked. Scenarios in which the private key is compromised. Background technique [0002] With the rapid development of cloud computing and storage technologies, major IT companies have successively launched their own cloud servers, and more and more users have begun to use these cloud servers for outsourced computing or storage. Electronic voting has become one of the more and more popular services used in daily life. The use of electronic voting has developed from politics, business, and science to the general public. It is also important to ensure the validity and legitimacy of electronic voting. become mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08G07C13/00
CPCG07C13/00H04L9/0894H04L9/3247H04L63/0428H04L63/1441
Inventor 张明武张语荻沈华张媛缓陈永辉蒋炎姚瑶谢兰鑫
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products