Threshold Paillier Encryption Web Service.ppt
《Threshold Paillier Encryption Web Service.ppt》由会员分享,可在线阅读,更多相关《Threshold Paillier Encryption Web Service.ppt(16页珍藏版)》请在麦多课文档分享上搜索。
1、10/25/2006,1,Threshold Paillier Encryption Web Service,A Masters Project Proposal by Brett Wilson,2,10/25/2006,Motivation,Secure Electronic Voting Research Interest in improving current voting process is high 2000 Presidential election snafu Improved access/availability (voter turnout) Cryptographic
2、 research has led to new solutions to problems with electronic voting Basic requirements for electronic voting Privacy All votes should be kept secret Completeness All valid votes should be counted correctly Soundness Any invalid vote should not be counted Unreusability No voter can vote twice Eligi
3、bility Only authorized voters can cast a vote Fairness Nothing can affect the voting Extended Requirements for electronic voting Robustness faulty behavior of any reasonably sized coalition of participants can be tolerated Universal Verifiability any party can verify the result of the voting Recipt-
4、freeness Voters are unable to prove the content of his/her vote Incoercibility Voter cannot be coerced into casting a particular vote by a coercer,3,10/25/2006,Motivation,Many of the proposed electronic voting protocols utilize threshold homomorhpic encryption schemes as part of the protocol Protect
5、s voter privacy Individual vote can not be decrypted without cooperation of t of l “authorities” Efficient, universally verifiable vote tallying Only sum of votes is decrypted Individuals can compute encrypted sum, verify proof of correct decryption of sum Implementations of threshold homomorphic en
6、cryption algorithms are not freely available,4,10/25/2006,Threshold Encryption,Public key encryption as usual Distribute secret key “shares” among l participants Decryption can only be accomplished if a threshold number t of the l participants cooperate No information about m can be obtained with le
7、ss than t participants cooperating Proof of valid decryption is provided,5,10/25/2006,Paillier Encryption,Trapdoor Discrete Logarithm Scheme c = gMrn mod n2n is an RSA modulusg is an integer of order n mod n2r is a random number in Zn* M = L(c(n) mod n2)/L(g(n) mod n2) mod n L(u) = (u-1)/n, (n)=lcm(
8、p-1)(q-1) Important Properties HomomorphicE(M1 + M2) = E(M1) x E(M2), E(k x M) = E(M)k Self-blinding Re-encryption with a different r doesnt change M,6,10/25/2006,Threshold Paillier Encryption,Different public key and secret key generation algorithm Distribute key shares using RSA public key encrypt
9、ion Distribute secret key shares using Shamir Secret Sharing scheme Web Service will be an implementation of scheme proposed in “Sharing Decryption in the Context of Voting or Lotteries” Fouque, Poupard, and Stern 2000,7,10/25/2006,Use of Threshold Paillier Encryption in Secure Voting,Ballot format:
10、 pick 1 out of c candidates Let N be number of voters, k such that N2k Vote = 2ck where c is the desired candidate number (0c) All Paillier-encrypted votes could be publicly posted Votes include proof of validity (v lies in a given set of valid votes) At end of election, all invalid votes are remove
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- THRESHOLDPAILLIERENCRYPTIONWEBSERVICEPPT
