Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 林敏惠 | en_US |
dc.contributor.author | Lin, Min-Hui | en_US |
dc.contributor.author | 黃景彰 | en_US |
dc.contributor.author | Hwang Jing-Jang | en_US |
dc.date.accessioned | 2014-12-12T02:18:52Z | - |
dc.date.available | 2014-12-12T02:18:52Z | - |
dc.date.issued | 1997 | en_US |
dc.identifier.uri | http://140.113.39.130/cdrfb3/record/nctu/#NT860396002 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/62954 | - |
dc.description.abstract | Secret balloting through the Internet is not only a technical evolution, but also a social activity realizable in the near future. We consider four phases necessary to complete the evolving progress: (1) theoretical research, (2) development and implementation of prototype systems, (3) trial experiments on pilot systems, and (4) promotion toward widespread acceptance from the society. In this dissertation, we refine a theoretic protocol, implement a prototype system based on the revised protocol, and conducIn the effort of theoretic improvement, we revise the order of Mixer's procedures in Hwang's protocol [36] to enhance privacy of ballots. In addition, we design in details authorities' acknowledgments and evidences. Therefore, through the extension of Hwang's protocol, a voter can protect his legal right of keeping his ballot private and verifying his vote on the one hand; on the other, authorities can prevent themselves from malfeasant accusation. In the effort of system implementation, we develop a secret balloting system for group decision environment. To investigate user attitude toward a secret balloting system, we conduct a questionnaire with the prototype system and specify students of Institute of Information Management in NCTU as our sample. From this investigation we arrive at a conclusion that for users with more experiences of using computers, a secret balloting system provides as much anonymity as does a questionnaire.A limit of our current prototype system is that it does not provide the functions of receipt-free and universal verifiability. As a result, it is not suitable for a large-scale election. The experimental result proves our system operational, so we suggest that the system be used in a group decision environment.In our solution, voters can prove their votes to the court, and accuse the cheating official. Now, we don't have any acceptable solution to receipt-free and universal verifiability, we would study more related literatures and try to propose some solutions. When we can propose a solution satisfied both receipt-free and universal verifiability. We also would like to revise our secret balloting system for a large-scale election. | zh_TW |
dc.language.iso | zh_TW | en_US |
dc.subject | 秘密投票 | zh_TW |
dc.subject | 匿名性 | zh_TW |
dc.subject | 現代電腦密碼技術 | zh_TW |
dc.subject | 智慧卡 | zh_TW |
dc.subject | 小規模的群體決策 | zh_TW |
dc.subject | secret balloting | en_US |
dc.subject | anonymity | en_US |
dc.subject | computer cryptography | en_US |
dc.subject | smart card | en_US |
dc.subject | group decision | en_US |
dc.title | 網際網路秘密投票之研究 | zh_TW |
dc.title | Secret Balloting Through the Internet | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | 資訊管理研究所 | zh_TW |
Appears in Collections: | Thesis |