With the development of computer network technology, network information security problem becomes more and more important. Digital signature as one of key technology of the information security is widely used in military, communication, e-commerce, etc. With "electronic signature law" being put into practice, the application of digital signature will become more and more popular.The paper firstly introduces some basic conceptions of cryptography, such as hash function, symmetry key cipher system, public key system, elliptic curve cipher, digital signature, blind signature etc and and typical blind signature schemes, for instance, RSA blind signature scheme, Schnorr blind signature scheme and EIGamal blind signature scheme. A secrecy vote protocol based on blind signature is also summarized.Secondly, it analyses the electronic vote system of Washington College, including the security, the modules's function and protocol flow. Then the security leak of sensus system is indicated and amodified is proposed. The new system is more secure compared with the sensus system. Then the paper proposes a secure and high efficiency electronic vote protocol based on elliptic curve cipher and blind signature. The scheme satisfies basic needs such as security, rationality and anonymity. It also hasverifiability and non-receipt. Besides, it can advnce the operation efficiency.Then aelectronic vote system based on this scheme is designed in detail. In the end, this paper presents the assumption of thefurther improvement and research of electronic vote theory and looks forward to the development trend in the future. |