The Cryptanalysis and Improvement of a Particular Quantum Voting Model

As an important topic of quantum cryptography, quantum voting has attracted more and more attentions recently. However, with our analysis, it can be seen that there exist some serious problems in a particular quantum voting model. Firstly, the voter does not have the ability to vote as his own. Secondly, the voter may be dishonest and can deny some corresponding voting results. Furthermore, some improvements will be presented to solve the loopholes.

[1]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[2]  L. Harn Cryptanalysis of the blind signatures based on the discrete logarithm problem , 1995 .

[3]  Jian-zhong Zhang,et al.  A Voting Protocol Based on the Controlled Quantum Operation Teleportation , 2015, International Journal of Theoretical Physics.

[4]  Bu-Qing Chen,et al.  An Improved Quantum Voting Scheme , 2018, International Journal of Theoretical Physics.

[5]  Shu-Cui Xie,et al.  A Choreographed Distributed Electronic Voting Scheme , 2018, International Journal of Theoretical Physics.

[6]  M. Hillery Quantum voting and privacy protection: first steps , 2006 .

[7]  Hai-Jing Cao,et al.  A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature , 2016 .

[8]  Hoi-Kwong Lo,et al.  A simple proof of the unconditional security of quantum key distribution , 1999, ArXiv.

[9]  Binayak S. Choudhury,et al.  Simultaneous Teleportation of Arbitrary Two-qubit and Two Arbitrary Single-qubit States Using A Single Quantum Resource , 2018 .

[10]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[11]  Mark M. Wilde,et al.  Hadamard quantum broadcast channels , 2016, Quantum Inf. Process..

[12]  Shu-cui Xie,et al.  A Quantum Multi-proxy Multi-blind-signature Scheme Based on Genuine Six-Qubit Entangled State , 2016, International Journal of Theoretical Physics.

[13]  Peng-Fei Li,et al.  A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States , 2018 .

[14]  Jinn-ke Jan,et al.  A secure electronic voting protocol with IC cards , 1997, J. Syst. Softw..

[15]  Yan Ping Li,et al.  A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State , 2015, International Journal of Theoretical Physics.

[16]  D. Horoshko,et al.  Quantum anonymous voting with anonymity check , 2009, 0911.5605.

[17]  Anthony Chefles,et al.  Quantum protocols for anonymous voting and surveying , 2005, quant-ph/0504161.

[18]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[19]  Sheng-De Wang,et al.  A secure and practical electronic voting scheme , 1999, Comput. Commun..

[20]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[21]  Zulfikar Ramzan,et al.  Group Blind Digital Signatures: A Scalable Solution to Electronic Cash , 1998, Financial Cryptography.

[22]  Qiaoyan Wen,et al.  Self-tallying quantum anonymous voting , 2016, 1605.07942.

[23]  Jia-lei Zhang,et al.  An Elaborate Secure Quantum Voting Scheme , 2017, International Journal of Theoretical Physics.

[24]  V. Buzek,et al.  Toward protocols for quantum-ensured privacy and secure voting , 2011, 1108.5090.

[25]  Li-Hua Gong,et al.  An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States , 2016 .

[26]  Ali Zakerolhosseini,et al.  A sessional blind signature based on quantum cryptography , 2014, Quantum Inf. Process..

[27]  Anirban Pathak,et al.  Protocols for quantum binary voting , 2017 .

[28]  P. Panigrahi,et al.  Perfect teleportation, quantum-state sharing, and superdense coding through a genuinely entangled five-qubit state , 2007, 0708.3785.

[29]  V. Buzek,et al.  Towards quantum-based privacy and voting , 2005, quant-ph/0505041.

[30]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[31]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[32]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.