J4 ›› 2011, Vol. 46 ›› Issue (9): 9-13.

• Articles • Previous Articles     Next Articles

Secure quantum voting protocol

WEN Xiao-,2, CAI Xue-jun1   

  1. 1. School of Electronics & Information Engineering, Shenzhen Polytechnic, Shenzhen 518055, Guangdong, China;
    2. Key Laboratory of Communications and Information System, Beijing Jiaotong University, Beijing 100044, China
  • Received:2010-05-19 Online:2011-09-20 Published:2011-09-08

Abstract:

 Based on the actual demand for labor vote, a model and a protocol of quantum voting was proposed. This protocol overcomed the limitations of calculation security in the classic electronic voting protocol, and had unconditional security. With the existing quantum vote protocol, the realtime monitoring was used to instead of post audit to oversee the verifier’s behavior. The security and efficiency of our protocol were improve by reducing the technical difficulty.

Key words: quantum voting; unconditional security; blind signature

No related articles found!
Viewed
Full text
692
HTML PDF
Just accepted Online first Issue Just accepted Online first Issue
0 0 0 0 0 692

  From Others local
  Times 34 658
  Rate 5% 95%

Abstract
803
Just accepted Online first Issue
0 0 803
  From Others local
  Times 789 14
  Rate 98% 2%

Cited

Web of Science  Crossref   ScienceDirect  Search for Citations in Google Scholar >>
 
This page requires you have already subscribed to WoS.
  Shared   
  Discussed   
No Suggested Reading articles found!