Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting

Автор: Cherkesova Larisa V., Safaryan Olga A., Mazurenko Alexander V., Arkhangelskaya Nadezhda S.

Журнал: Вестник Донского государственного технического университета @vestnik-donstu

Рубрика: Информатика, вычислительная техника и управление

Статья в выпуске: 3 (90) т.17, 2017 года.

Бесплатный доступ

Introduction. One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals. A new algorithm for the distribution of threshold sensitive data for electronic voting is proposed. Materials and Methods. The results are obtained on the basis of the following methodology: finite field theory, theory of algorithms, projective geometry, and linear algebra. The developed cryptosystem is based on the application of geometric objects from projective geometry which makes it possible to use the apparatus of linear algebra to make effective decisions on cryptographic problems. To estimate the complexity of the described algorithms, classical results from the theory of algorithms are applied. Research Results. This paper describes the cryptographic algorithms of secret sharing and its subsequent restoration based on special structural properties of projective spaces over finite fields, and their link with Galois fields of the appropriate order. The component parts of these algorithms, specifically, the construction of injective mapping from a residue ring prime modulo into the projective space over finite field of specific dimension; the generation of secret shares and secret; the procedure of secret sharing and its restoration, are described in great detail. The algorithmic time complexity calculations of the formal algorithms are given. Discussion and Conclusions. The described scheme is useful for electronic voting and in other spheres where methods of threshold cryptography are applied.

Еще

Cryptography, electronic voting, threshold cryptography, secret sharing, elgamal encryption system, public-key cryptography, cryptographic secret, cryptographic algorithm, information security, cryptographic key

Короткий адрес: https://sciup.org/14250295

IDR: 14250295   |   DOI: 10.23947/1992-5980-2017-17-3-145-155

Статья научная