J4 ›› 2011, Vol. 46 ›› Issue (9): 9-13.

• Articles • Previous Articles     Next Articles

Secure quantum voting protocol

WEN Xiao-,2, CAI Xue-jun1   

  1. 1. School of Electronics & Information Engineering, Shenzhen Polytechnic, Shenzhen 518055, Guangdong, China;
    2. Key Laboratory of Communications and Information System, Beijing Jiaotong University, Beijing 100044, China
  • Received:2010-05-19 Online:2011-09-20 Published:2011-09-08


 Based on the actual demand for labor vote, a model and a protocol of quantum voting was proposed. This protocol overcomed the limitations of calculation security in the classic electronic voting protocol, and had unconditional security. With the existing quantum vote protocol, the realtime monitoring was used to instead of post audit to oversee the verifier’s behavior. The security and efficiency of our protocol were improve by reducing the technical difficulty.

Key words: quantum voting; unconditional security; blind signature

No related articles found!
Full text



No Suggested Reading articles found!