4.5 Article

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

Journal

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
Volume 130, Issue -, Pages 91-97

Publisher

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jpdc.2019.04.003

Keywords

Multi-secret sharing; Multi-role e-voting; Decentralized system; Cloud computing

Funding

  1. National Natural Science Foundation of China [61472091, 61370194]
  2. Natural Science Foundation of Guangdong Province for Distinguished Young Scholars [2014A030306020]
  3. Guangzhou scholars project for universities of Guangzhou [1201561613]
  4. Science and Technology Planning Project of Guangdong Province, China [2015B010-129015]
  5. National Natural Science Foundation for Outstanding Youth Foundation [61722203]
  6. National Key R&D Program of China [2016YFN0800602]
  7. Shandong provincial Key R&D Program of China [2018CXGC0701]
  8. State Key Laboratory of Network and Switching Technology [SKLNST-2018-1-11]

Ask authors/readers for more resources

The cryptosystem-based data privacy preserving methods employ high computing power of cloud servers, where the main feature is to allow resource sharing and provide multi-user independent services. Therefore, to achieve the rapid allocation and release of resource sharing in cloud computing, decentralized cryptographic protocols need to be proposed for multi-user consensus systems. In this work, we first present a multi-secret sharing scheme with multi-level access structure, where the secret reconstruction algorithm satisfies the additive homomorphism. The secret sharing scheme needs no trusted third parties and any user can play the role of dealer. In the designing, multiple target secrets are independently shared, where each subset of users forms a sub-access structure and shares one target secret only with a short secret share. This scheme is efficient and unconditionally secure. Furthermore, based on the multi-level access structures, a decentralized multi-role e-voting protocol is designed using Chinese Remainder Theorem, where each role's election is associated with one sub-access structure. The voters employ a shared parameter to blind the sum of ballot values. Meanwhile, the e-voting scheme supports a public verification for the final election results. Compared with the existing e-voting protocols, our e-voting system does not require any authority center and the cloud server runs vote counting. And our e-voting scheme does not need any high-complexity computational cost operation such as module exponential operation, etc. Finally, the common feature of Blockchain and Ad Hoc networks is decentralized. Thus the main idea of this protocol without a trusted third party can be used to achieve a secure consensus among multiple nodes in Blockchain and Ad Hoc network, meanwhile, the consensus results can be verified. (C) 2019 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available