Cryptographic protocols for electronic voting

D Wagner - Advances in Cryptology-CRYPTO 2006: 26th Annual …, 2006 - Springer
Electronic voting has seen a surge of growth in the US over the past five years; yet many
questions have been raised about the trustworthiness of today's e-voting systems. One …

[PDF][PDF] A framework for comparing the security of voting schemes

A Juvonen - Department of Computer Science, University of …, 2019 - attejuvonen.fi
In recent years, politicians in many countries have been pushing towards digitalization of
voting methods, which has sparked security concerns from both the general public and …

[PDF][PDF] Surveying and improving electronic voting schemes

J Goulet, J Zitelli - CSE400_20042005/senior_design_projects_04_05 …, 2004 - Citeseer
While recent controversies concerning the weaknesses of current voting machines have
drawn some interest to methods of online voting, as well as other voting technologies, the …

[PDF][PDF] Cryptographic Voting Protocols: A Systems Perspective.

C Karlof, N Sastry, DA Wagner - USENIX Security Symposium, 2005 - usenix.org
Cryptographic voting protocols offer the promise of verifiable voting without needing to trust
the integrity of any software in the system. However, these cryptographic protocols are only …

[图书][B] Towards trustworthy elections: new directions in electronic voting

D Chaum, M Jakobsson, RL Rivest, PYA Ryan… - 2010 - Springer
If you are interested in this challenging problem—a problem that even school children can
understand but that is made harder than traditional computer security by requirements for …

[PDF][PDF] A Discussion of Cryptographic Protocols for Electronic Voting

L Barlow - 2003 - Citeseer
A Discussion of Cryptographic Protocols for Electronic Voting Page 1 A Discussion of
Cryptographic Protocols for Electronic Voting Lelia Barlow December 2003 Page 2 Introduction …

Voting schemes

B Schoenmakers - Algorithms and theory of computation handbook …, 2010 - dl.acm.org
Electronic voting is probably the single most controversial application in the field of
information security. Almost any area in information security, from computer security and …

[PDF][PDF] Simple verifiable elections.

J Benaloh - EVT, 2006 - usenix.org
Much work has been done in recent decades to apply sophisticated cryptographic
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …

[PDF][PDF] Matters of coercion-resistance in cryptographic voting schemes

C Kempka - 2014 - scholar.archive.org
Electronic voting has gained more and more interest during the last decades. It promises
less error-prone and faster tallying, while saving paper as well as working time. On top of …

[PDF][PDF] A framework for secure electronic voting

S Popoveniuc, PL Vora - Proceedings of the 2008 IAVoSS Workshop …, 2008 - seas.gwu.edu
A framework for secure electronic voting Page 1 A framework for secure electronic voting
Stefan Popoveniuc and Poorvi L. Vora The George Washington University Department of …