Wuhan University Journal of Natural Sciences

, Volume 11, Issue 6, pp 1777–1780 | Cite as

A secure anonymous internet electronic voting scheme based on the polynomial

  • Cao Feng
  • Cao Zhenfu
Security of Network and Communication


In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

Key words

electronic voting blind signature RSA (Rivest, Shamir, Adleman) polynomial function 

CLC number

TP 309 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Chaum D. Untraceable Eelectronic Mail, Return Address and Digital Pseudonyms [J].Communication of ACM, 1981,24 (2):84–90.CrossRefGoogle Scholar
  2. [2]
    Chang Chinchen, Wu Wenbin. A Secure Voting System a Pubic Network [J].Networks, 1997,29(2):81–87.CrossRefGoogle Scholar
  3. [3]
    Riera A, Borrell J, Rifa J. An Uncoercible Verifiable Electronic Voting Protocol [C]//IFIP TC11 Conference. Vienna, Autriche, Aug 1998.Google Scholar
  4. [4]
    Chen Yuyi, Jan Jinnke, Chen Chinling, The Design of a Secure Anonymous Internet Voting System [J].Computer and Security, 2004,23(4):330–337.CrossRefGoogle Scholar
  5. [5]
    Dini G. A Secure and Available Electronic Voting Service for a Large-Scale Distributed System [J].Future Generation Comput Syst, 2003,19(1):69–85.MATHCrossRefGoogle Scholar
  6. [6]
    Fujioka A, Okamoto T, Ohta K. A Practical Secret Voting Scheme for Large Scale Elections [C]//Advances in Cryptology—AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques Gold Coast. Queensland, Australia, Dec 13–16, 1992.Google Scholar
  7. [7]
    Liaw Horntwu, A Secure Electronic Voting Protocol for General Elections [J].Computers and Security, 2004,23 (2):107–119.CrossRefGoogle Scholar
  8. [8]
    Chaum D. Blind Signature Systems [C].Proceedings of advances in Crypto '83. New York: Springer-Verlag, 1998. 153–156.Google Scholar
  9. [9]
    Chaum D. Blinding for Unanticipated Signatures [C]//Advances in Cryptology-EUROCRYPT '87,Workshop on the Theory and Application of Cryptographic Techniques. Amsterdam, The Netherlands, April, 1987.Google Scholar
  10. [10]
    Lin Iuonchang, Hwang Minshiang, Chang Chinchen. Security Enhancement for Anonymous Secure E-Voting over a Network [J].Computer Standards & Interfaces, 2003,25(2): 131–139.CrossRefGoogle Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  1. 1.School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations