2017
DOI: 10.1155/2017/3075210
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

Abstract: Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…In 2017, Chiou et al [38] proposed a novel oblivious signature which is integrated with proxy signature. eir protocol defines seven security requirements: completeness, unforgeability, unlinkability, undeniability, verifiability, distinguishability, and ambiguity.…”
Section: Oblivious Signature Schemementioning
confidence: 99%
See 4 more Smart Citations
“…In 2017, Chiou et al [38] proposed a novel oblivious signature which is integrated with proxy signature. eir protocol defines seven security requirements: completeness, unforgeability, unlinkability, undeniability, verifiability, distinguishability, and ambiguity.…”
Section: Oblivious Signature Schemementioning
confidence: 99%
“…In 2017, Chiou et al [20] proposed two novel 1-out-of-n blind (oblivious) and proxy signature schemes that combine the advantages of oblivious signatures and proxy signatures and satisfy the security properties of these two signature schemes. In 2018, Lin et al [21] proposed a short linearly homomorphic proxy signature scheme, and Li et al [22] proposed a blind proxy resignature scheme based on isomorphisms of polynomials.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations