{"title":"Multi-input Functional Encryption Based Electronic Voting Scheme","authors":"Yang Chen, You Lin","doi":"10.1109/3PGCIC.2014.32","DOIUrl":null,"url":null,"abstract":"As voting plays an important role in democratic society, both the privacy and verifiability of voting are particularly important in computer-supported voting system. In this paper, we propose a secret voting scheme that based on multi-input functional encryption. Compared with other traditional voting systems, our scheme not only can keep anonymity and receipt freeness while voting proceedings, but also can publicly verify the result of the voting for every voter. In addition, we prove that our scheme can keep secrecy and achieve verifiability by using a multi-input functional encryption.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
As voting plays an important role in democratic society, both the privacy and verifiability of voting are particularly important in computer-supported voting system. In this paper, we propose a secret voting scheme that based on multi-input functional encryption. Compared with other traditional voting systems, our scheme not only can keep anonymity and receipt freeness while voting proceedings, but also can publicly verify the result of the voting for every voter. In addition, we prove that our scheme can keep secrecy and achieve verifiability by using a multi-input functional encryption.