An electronic voting protocol preserving Voter's privacy

H YAMAGUCHI, A KITAZAWA, H DOI… - … on Information and …, 2003 - search.ieice.org
In this paper we present a new, two-centered electronic voting scheme that is capable of
preserving privacy, universal verifiability, and robustness. An interesting property of our …

A secure and fully private borda voting protocol with universal verifiability

C Wang, H Leung - … of the 28th Annual International Computer …, 2004 - ieeexplore.ieee.org
Extensive studies have been made on electronic voting in the last twenty years, and many
schemes have been proposed, in which both security and effectiveness have been …

A secure voter-resolved approval voting protocol over internet

C Wang, H Leung - Proceedings of the 7th international conference on …, 2005 - dl.acm.org
Electronic online voting has become one of the most popular activities over Internet recently,
since it can be performed in a way that is more convenient, faster and cheaper. Security and …

Electronic voting: Starting over?

Y Desmedt, K Kurosawa - … , ISC 2005, Singapore, September 20-23, 2005 …, 2005 - Springer
We solve an 18 year open problem on e-voting. While most research on e-voting is focused
on MIX servers, or on homomorphic encryption based schemes, or on blind signatures …

[PDF][PDF] Prêta voter: All-in-one

Z Xia, S Schneider, J Heather, PYA Ryan… - … of Workshop On …, 2007 - researchgate.net
A number of voter-verifiable electronic voting schemes have been introduced in the recent
decades. These schemes not only provide each voter with a receipt without the threat of …

A secure and practical electronic voting scheme

WC Ku, SD Wang - Computer Communications, 1999 - Elsevier
Electronic voting schemes can be divided into homomorphism encryption and anonymous
channel based schemes. The former type requires massive communications and …

Efficient receipt-free voting based on homomorphic encryption

M Hirt, K Sako - International Conference on the Theory and …, 2000 - Springer
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote,
and hence thwart vote-buying and coercion. We analyze the security of the multi-authority …

Evaluating security of voting schemes in the universal composability framework

J Groth - Applied Cryptography and Network Security: Second …, 2004 - Springer
In the literature, voting protocols are considered secure if they satisfy requirements such as
privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol …

Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections

TVT Doan, O Pereira, T Peters - International Conference on Applied …, 2024 - Springer
We design new encryption mechanisms that enable the design of the first universally
verifiable voting schemes, supporting both receipt-freeness and everlasting privacy without …

Receipt-free electronic voting based on semi-trusted model

XF Chen, JL Wang, Y Wang - CHINESE JOURNAL OF COMPUTERS …, 2003 - cjc.ict.ac.cn
Background A receipt-free electronic voting scheme is proposed by using the techniques of
homomorphic ElGamal encryption, threshold encryption and proof of knowledge. It …