next up previous
Next: Registration Protocol Up: A New Practical Secure Previous: Model of The Scheme

Protocols

In this section, we first define a set of notations, then use them to describe our protocols. The notations are defined as follow:

 ¯V : voter V.

A : authority.

T : tallier.

tex2html_wrap_inline258 : the public key of the authority.

tex2html_wrap_inline260 : the private key of the authority.

tex2html_wrap_inline262 : the tallying key (public key) of voter V.

tex2html_wrap_inline264 : the voting key ( private key) of voter V.

R: a random number.

h: one-way hash function.

tex2html_wrap_inline270 : the symmetric encryption key of voter V.

tex2html_wrap_inline272 : the plaintext of ballot casted by Voter V.

tex2html_wrap_inline274 : encrypt message M with key tex2html_wrap_inline276 by symmetrical cryptosystem.

tex2html_wrap_inline278 : decrypt cipher with key tex2html_wrap_inline280 by symmetrical cryptosystem.

tex2html_wrap_inline282 : signature on message M signed with the private key of tex2html_wrap_inline284 .

tex2html_wrap_inline286 : decrypt cipher C with the public key of tex2html_wrap_inline288 .





Qi He
Thu Dec 25 16:06:46 EST 1997