| Buying and voting is two long-standing activities,they are not only an indispensable part of people’s lives,but also the key to business operations and management.Now,with the rapid development of computer and network technology,the Internet information age has come quietly.Internet information age endues the buying and voting with new forms of activities,such as electronic voting,electronic auction,electronic transactions,etc.Advanced network technology has brought us a variety of convenience and economic interests.But at the same time,a huge amount of information will also bring all kinds of potential safety hazard to our life as well.With the increasing demand for the protection of personal privacy,how to protect the security of information has become a major theme of the times.The emergence of secure multi-party computation provides security for the Internet information age,which is full of potential safety hazard and with information explosion.The secure multi-party computation allows the participants achieve a variety of function calculations,in order to complete lots of new activities without the help of third-party participation or leaking any privacy in the mistrust network environment,juse through the information exchange among the participants.Therefore,the research of this paper is based on the secure multi-party computation and devotes to the study of electronic voting and electronic auction,.Besides,these two research directions will be applied into the specific enterprise management situation.The specific work is as follows:First of all,this article will make a detailed explanation of the security multi-party computation and summary two important component of secure multi-party computation.One is secure multi-party summation,the other one is secure multi-party ranking.Then propose a new secure multi-party ranking protocol,the protocol is safe,effective and the computational complexity is low,which can laid a good foundation for the electronic voting protocol and the electronic auction protocol which will show out later.Secondly,the article puts forward two kinds of new electronic voting protocol.One is a new kind of typical electronic voting protocol.This protocol is a verifiable E-voting scheme based on Secure multi-party computation and the protocol can be full privacy cover,verifiable,high efficiency and strong applicability.The other procotol is an extension of the conventional electronic voting protocol-internal voting procotol.It’s also an E-voting scheme based on secure multi-party computation,this protocol also can bu full privacy,verifiable,and simple calculation.At the same time,this article applies two kinds of electronic voting protocols into the actual situation,like the cumulative voting system and the voting of corporate board,which can fully demonstrates the plasticity and practicability of these two protocols.Finally,on the basis of summarize various types of electronic voting protocol and its security requirement,this article proposes a new electronic auction protocol based on secure multi-party computation,although the protocol is relatively simple,but it meet the requirement of the security of electronic auction protocol.At the same time,the calculation of the protocol is simple and it can be convenient for application. |