Journal on Communications ›› 2022, Vol. 43 ›› Issue (9): 100-111.doi: 10.11959/j.issn.1000-436x.2022172
• Papers • Previous Articles Next Articles
Yatao YANG1,2, Deli LIU1, Peihe LIU2, Ping ZENG1,2, Song XIAO1,2
Revised:
2022-06-06
Online:
2022-09-25
Published:
2022-09-01
Supported by:
CLC Number:
Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption[J]. Journal on Communications, 2022, 43(9): 100-111.
"
BFV流程 | 具体应用 |
私钥sk生成 | 随机生成的一个系数为-1、0或1的多项式 |
公钥pk生成 | |
离散高斯分布中随机选取的一组小系数,e在此处只用一次,用完后丢弃 | |
计算密钥rlk生成 | |
与公钥生成阶段该多项式的生成方式相同 | |
选票加密(密文为cm ) | |
candk 即需要加密的明文;u为系数为-1、0或1的多项式;t为远小于系数模 p的整数;e1、e2取自相同的高斯 | |
离散分布;u、e1、e2只在加密过程中使用,使用完后丢弃;pk为BFV的公钥, | |
计票(BFV密文相加运算) | 的投票情况密文相加的结果, |
文mj加密后得到的两位密文 | |
BFV解密 |
[1] | CHAUM D L . Untraceable electronic mail,return addresses,and digital pseudonyms[J]. Communications of the ACM, 1981,24(2): 84-90. |
[2] | WANG K H , MONDAL S K , CHAN K ,et al. A review of contemporary E-voting:requirements,technology,systems and usability[J]. Data Science and Pattern Recognition, 2017,1(1): 31-47. |
[3] | ALAM K M R , TAMURA S , RAHMAN S M S ,et al. An electronic voting scheme based on revised-SVRM and confirmation numbers[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(1): 400-410. |
[4] | ARANHA D F , BAUM C , GJ?STEEN K ,et al. Lattice-based proof of shuffle and applications to electronic voting[C]// Cryptographers’ Track at the RSA Conference (CT-RSA). Berlin:Springer, 2021: 227-251. |
[5] | HAINES T , GORé R , SHARMA B . Did you mix me? Formally verifying verifiable mix nets in electronic voting[C]// Proceedings of 2021 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2021: 1748-1765. |
[6] | KUMAR M , CHAND S , KATTI C P . A secure end-to-end verifiable Internet-voting system using identity-based blind signature[J]. IEEE Systems Journal, 2020,14(2): 2032-2041. |
[7] | KUMAR M , KATTI C P , SAXENA P C . A secure anonymous e-voting system using identity-based blind signature scheme[C]// International Conference on Information Systems Security (ICISS). Berlin:Springer, 2017: 29-49. |
[8] | ZHANG X , ZHANG J Z , XIE S C . A secure quantum voting scheme based on quantum group blind signature[J]. International Journal of Theoretical Physics, 2020,59(3): 719-729. |
[9] | FAN X Y , WU T , ZHENG Q H ,et al. HSE-Voting:a secure high-efficiency electronic voting scheme based on homomorphic signcryption[J]. Future Generation Computer Systems, 2020,111: 754-762. |
[10] | FAN X Y , WU T , ZHENG Q H ,et al. DHS-voting:a distributed homomorphic signcryption E-voting[C]// International Conference on Dependability in Sensor,Cloud,and Big Data Systems and Applications (DepenSys). Berlin:Springer, 2019: 40-53. |
[11] | 杨亚涛, 赵阳, 张奇林 ,等. 基于 SEAL 库的同态加权电子投票系统[J]. 计算机学报, 2020,43(4): 711-723. |
YANG Y T , ZHAO Y , ZHANG Q L ,et al. Weighted electronic voting system with homomorphic encryption based on SEAL[J]. Chinese Journal of Computers, 2020,43(4): 711-723. | |
[12] | ADIDA B , . Helios:Web-based open-audit voting[C]// USENIX Security Symposium (USS). Berkeley:USENIX Association, 2008: 335-348. |
[13] | ARA A , AL-RODHAAN M , TIAN Y ,et al. A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems[J]. IEEE Access, 2017,5: 12601-12617. |
[14] | ANJIMA V S , HARI N N . Secure cloud e-voting system using fully homomorphic elliptical curve cryptography[C]// Proceedings of 2019 International Conference on Intelligent Computing and Control Systems (ICCS). Piscataway:IEEE Press, 2019: 858-864. |
[15] | KIM H , KIM K E , PARK S ,et al. E-voting system using homomorphic encryption and blockchain technology to encrypt voter data[J]. arXiv Preprint,arXiv:2111.05096, 2021. |
[16] | PATEL B , TANDEL P , SANGHVI S . Efficient ballot casting in ranked based voting system using homomorphic encryption[C]// International Conference on Advances in Computing and Data Sciences (ICACD). Berlin:Springer, 2019: 565-576. |
[17] | CHILLOTTI I , GAMA N , GEORGIEVA M ,et al. A homomorphic LWE based E-voting scheme[C]// Post-Quantum Cryptography (PQC). Berlin:Springer, 2016: 245-265. |
[18] | DUCAS L , DURMUS A , LEPOINT T ,et al. Lattice signatures and bimodal Gaussians[C]// 33rd Annual Cryptology Conference on Advances in Cryptology (CRYPTO). Berlin:Springer, 2013: 40-56. |
[19] | YADAV V K , ANAND A , VERMA S ,et al. Private computation of the Schulze voting method over the cloud[J]. Cluster Computing, 2020,23(4): 2517-2531. |
[20] | PANDEY A , BHASI M , CHANDRASEKARAN K . VoteChain:a blockchain based E-voting system[C]// Proceedings of 2019 Global Conference for Advancement in Technology (GCAT). Piscataway:IEEE Press, 2019: 1-4. |
[21] | ALAM A , RASHID S M Z U , ABDUS SALAM M ,et al. Towards blockchain-based E-voting system[C]// Proceedings of 2018 International Conference on Innovations in Science,Engineering and Technology (ICISET). Piscataway:IEEE Press, 2018: 351-354. |
[22] | YU B , LIU J K , SAKZAD A ,et al. Platform-independent secure blockchain-based voting system[C]// International Conference on Information Security (ICIS). Berlin:Springer, 2018: 369-386. |
[23] | PRIYA J C , BHAMA P R S , SWARNALAXMI S ,et al. Blockchain centered homomorphic encryption:a secure solution for E-balloting[C]// International Conference on Computer Networks,Big Data and IoT. Berlin:Springer, 2018: 811-819. |
[24] | FAN J , VERCAUTEREN F . Somewhat practical fully homomorphic encryption[J]. IACR Cryptology Eprint Archive, 2012,1(1): 144-156. |
[25] | PANJA S , ROY B . A secure end-to-end verifiable E-voting system using blockchain and cloud server[J]. Journal of Information Security and Applications, 2021,59:102815. |
[26] | 杨亚涛, 蔡居良, 张筱薇 ,等. 基于SM9算法可证明安全的区块链隐私保护方案[J]. 软件学报, 2019,30(6): 1692-1704. |
YANG Y T , CAI J L , ZHANG X W ,et al. Privacy preserving scheme in block chain with provably secure based on SM9 algorithm[J]. Journal of Software, 2019,30(6): 1692-1704. | |
[27] | KHADER D , SMYTH B , RYAN P Y A ,et al. A fair and robust voting system by broadcast[J]. Lecture Notes in Informatics, 2012,23(2): 285-299. |
[28] | 曹傧, 聂凯君, 彭木根 ,等. 无线网络中区块链共识算法的开销分析[J]. 北京邮电大学学报, 2020,43(6): 140-146. |
CAO B , NIE K J , PENG M G ,et al. Overhead analysis of blockchain consensus algorithm in wireless networks[J]. Journal of Beijing University of Posts and Telecommunications, 2020,43(6): 140-146. | |
[29] | DAGHER G G , MARELLA P B , MILOJKOVIC M ,et al. Broncovote:secure voting system using ethereum’s blockchain[J]. Computer Science, 2018,48(4): 96-107. |
[30] | SAADEH I A , ABANDAH G A . Investigating parallel implementations of electronic voting verification and tallying processes[C]// Proceedings of 2017 European Conference on Electrical Engineering and Computer Science (EECS). Piscataway:IEEE Press, 2017: 70-75. |
[31] | 何倩 . 基于全同态加密的电子投票方案研究[D]. 杭州:浙江理工大学, 2019. |
HE Q . Research on electronic voting scheme based on fully homomorphic encryption[D]. Hangzhou:Zhejiang Sci-Tech University, 2019. |
[1] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[2] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[3] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[4] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[5] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[6] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[7] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[8] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[9] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[10] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[11] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[12] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[13] | Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism [J]. Journal on Communications, 2022, 43(8): 176-187. |
[14] | Ruizhong DU, Tianhe ZHANG, Pengliang SHI. Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing [J]. Journal on Communications, 2022, 43(6): 168-178. |
[15] | Zijia MO, Zhipeng GAO, Yang YANG, Yijing LIN, Shan SUN, Chen ZHAO. Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles [J]. Journal on Communications, 2022, 43(4): 83-94. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|