Full metadata record
DC FieldValueLanguage
dc.contributor.author林敏惠en_US
dc.contributor.authorLin, Min-Huien_US
dc.contributor.author黃景彰en_US
dc.contributor.authorHwang Jing-Jangen_US
dc.date.accessioned2014-12-12T02:18:52Z-
dc.date.available2014-12-12T02:18:52Z-
dc.date.issued1997en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#NT860396002en_US
dc.identifier.urihttp://hdl.handle.net/11536/62954-
dc.description.abstractSecret balloting through the Internet is not only a technical evolution, but also a social activity realizable in the near future. We consider four phases necessary to complete the evolving progress: (1) theoretical research, (2) development and implementation of prototype systems, (3) trial experiments on pilot systems, and (4) promotion toward widespread acceptance from the society. In this dissertation, we refine a theoretic protocol, implement a prototype system based on the revised protocol, and conducIn the effort of theoretic improvement, we revise the order of Mixer's procedures in Hwang's protocol [36] to enhance privacy of ballots. In addition, we design in details authorities' acknowledgments and evidences. Therefore, through the extension of Hwang's protocol, a voter can protect his legal right of keeping his ballot private and verifying his vote on the one hand; on the other, authorities can prevent themselves from malfeasant accusation. In the effort of system implementation, we develop a secret balloting system for group decision environment. To investigate user attitude toward a secret balloting system, we conduct a questionnaire with the prototype system and specify students of Institute of Information Management in NCTU as our sample. From this investigation we arrive at a conclusion that for users with more experiences of using computers, a secret balloting system provides as much anonymity as does a questionnaire.A limit of our current prototype system is that it does not provide the functions of receipt-free and universal verifiability. As a result, it is not suitable for a large-scale election. The experimental result proves our system operational, so we suggest that the system be used in a group decision environment.In our solution, voters can prove their votes to the court, and accuse the cheating official. Now, we don't have any acceptable solution to receipt-free and universal verifiability, we would study more related literatures and try to propose some solutions. When we can propose a solution satisfied both receipt-free and universal verifiability. We also would like to revise our secret balloting system for a large-scale election.zh_TW
dc.language.isozh_TWen_US
dc.subject秘密投票zh_TW
dc.subject匿名性zh_TW
dc.subject現代電腦密碼技術zh_TW
dc.subject智慧卡zh_TW
dc.subject小規模的群體決策zh_TW
dc.subjectsecret ballotingen_US
dc.subjectanonymityen_US
dc.subjectcomputer cryptographyen_US
dc.subjectsmart carden_US
dc.subjectgroup decisionen_US
dc.title網際網路秘密投票之研究zh_TW
dc.titleSecret Balloting Through the Interneten_US
dc.typeThesisen_US
dc.contributor.department資訊管理研究所zh_TW
Appears in Collections:Thesis