ASIA unversity:Item 310904400/12810
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21661807      Online Users : 454
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/12810


    Title: RSA Time-Lock Puzzle Authenticated E-voting System
    Authors: Deviani, Rini
    Contributors: Department of Computer Science and Information Engineering
    Chen,Hsing-Chung
    Keywords: electronic voting;authentication;cryptography;time-lock puzzle;time-release;RSA
    Date: 2012
    Issue Date: 2012-11-18 09:54:01 (UTC+0)
    Publisher: Asia University
    Abstract: The main principle of e-voting is that it must be as similar to regular voting as possible, compliant with election legislation and principles and be at least as secure as regular voting. Therefore, e-voting must be uniform and secret, only eligible persons must be allowed to (e-) vote. Every voter should be able to cast only one vote; a voter must not be able to prove in favor of whom he/she voted. In addition to this the collecting of votes must be secure, reliable and accountable. In the term of Timed-Release Cryptography, e-voting is intended to prevent the early opening of electronically-case votes. It also avoids election fraud which means that all parties involved do not have access to the results until a specific, predefined time in the future. In this thesis, we propose an RSA time-lock puzzle authenticated e-voting system. Authentication, here, means to provide public key based authenticated encryption algorithm that takes sender’s secret key, receiver’s public key and designated time so that the resulting ciphertext can be decrypted only by receiver and only starting with designated time using receiver’s secret key, sender’s public key and some secret that will be disclosed only on designated time. RSA as one of the most famous cryptosystem is used and secure related to several main security issues.
    Appears in Collections:[Department of Computer Science and Information Engineering] Theses & dissertations

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML501View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback