搜索结果: 1-9 共查到“密码学 elections”相关记录9条 . 查询时间(0.078 秒)
Practical Strategy-Resistant Privacy-Preserving Elections
cryptographic protocols Privacy voting
2018/11/19
Recent advances in cryptography promise to let us run complex algorithms in the encrypted domain. However, these results are still mostly theoretical since the running times are still much larger than...
Many voting systems rely on art, rather than science, to ensure that votes are freely made, with equal influence. Such systems build upon creativity and skill, rather than scientific foundations. Thes...
A roadmap to fully homomorphic elections: Stronger security, better verifiability
fully homomorphic encryption remote internet voting quantum-safe
2017/2/24
After the trials of remote internet voting for local elections in 2011 and parliamentary elections in 2013, a number of local referendums has renewed interest in internet voting in Norway.
End-to-End Verifiable Elections in the Standard Model
e-voting standard model, end-to-end verificable
2015/12/31
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is endto-end
verifiable in the standard model, i.e., without any additional “setup” assumption or access
to a rando...
Ceremonies for End-to-End Verifiable Elections
e-voting systems end-to-end verifiability Helios
2015/12/18
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that
the election authorities are not manipulating the election result. This so-called “end-to-end
(E2E) verifia...
Secure Online Elections in Practice
E-Voting, E-Government Voting Service Provider Certification Authority
2009/6/3
Current remote e-voting schemes aim at a number of security
objectives. However, this is not enough for providing secure online elections
in practice. Beyond a secure e-voting protocol, there are ma...
Coercion-Resistant Electronic Elections
coercion-resistance electronic voting mix networks
2009/4/15
We introduce a model for electronic election schemes that involves a more powerful adversary than in previous
work. In particular, we allow the adversary to demand of coerced voters that they vote in...
Receipt-Free Homomorphic Elections and Write-in Ballots
Electronic Voting Receipt-Freeness Uncoercibility
2009/3/26
We present a voting protocol that protects voters’ privacy and achieves universal
verifiability, receipt-freeness, and uncoercibility without ad hoc physical assumptions or
procedural constraints (s...
Secret Ballot Elections with Unconditional Integrity
voting protocol election protocol voter-verifiability unconditional integrity
2008/8/18
This paper presents a voting scheme that allows voters to verify that their vote is accurately included in the count, whilst maintaining ballot secrecy and coercion resistance. It also presents a rigo...