盲签名研究及其在电子选举中的应用-应用数学专业毕业论文.docxVIP

  • 3
  • 0
  • 约4.27万字
  • 约 58页
  • 2019-05-14 发布于上海
  • 举报

盲签名研究及其在电子选举中的应用-应用数学专业毕业论文.docx

Research Research of blind signature and application in e-vote system Abstract Wit}l the development of computer network technology.network information security problem becomes more and more important.Digital signature as one of key technology of the information security is widely used in military,communication e-commerce,etc.With”electronic signature law”being put into practice,theapplication of digital signature will become more and more popular. The paper firstly introduces some basic concepfions of cryptography,such asdigital signature,blind signature,hash function etc and typical blind signature schemes,for instance,RSA blind signature scheme and E1Gamal blind signature scheme.The wide use of blind signature theory in e-vote system. Secondly,A multiple blind signature scheme based on E1Gamal blind signature scheme is designed with theory analysis to the security ofthe scheme.It ispossible for many signers to sign at the same time by using this scheme and thisscheme has both properties of blind and untraceable.Finally,this paper presents ananonymous electronic vote protocol on the basis of blind signature technology and security analysis of this protocol is presented in detail.The protocol Can realizeanonymity of voter of identity and prevent that one people have two votes or the samevote is thrown many times.Then an anonymous electronic vote system scheme basedon this protocol is proposed.This paper provides the design of function modules indetail and a part ofprogramming code is given. In the end,this paper presents theassumption of the further improvement and research of blind signature theory andlooks forward to the development wend of blind signature theory in the future. Keyword:digital signature;blind signature;proxy blind signature;multiple blindsignature;electronic vote 第1章绪论1.1引言 第1章绪论 1.1引言 随着计算机和通信网技术的发展和广泛应用,为人们工作、生活带来极大 便利,同时也带来了许多待解决的问题,其中信息的安全性就是一个突出的问题。 信息是一种资源,同时也是一种财富。因各种因素的影响,信息会受到破坏、窃 取、窜改等不同威胁以至信息无法使用。近二十年来发生的一系列威胁信息系统 的事件,如黑客利用分布式

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档