An overview of end-to-end verifiable voting systems

ST Ali, J Murray - Real-World Electronic Voting, 2016 - taylorfrancis.com
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …

Privacy and verifiability in voting systems: Methods, developments and trends

H Jonker, S Mauw, J Pang - Computer Science Review, 2013 - Elsevier
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …

[图书][B] Algorithms and theory of computation handbook, volume 2: special topics and techniques

MJ Atallah, M Blanton - 2009 - books.google.com
This handbook provides an up-to-date compendium of fundamental computer science
topics, techniques, and applications. Along with updating and revising many of the existing …

[PDF][PDF] Electing a university president using open-audit voting: Analysis of real-world use of Helios

B Adida, O De Marneffe, O Pereira, JJ Quisquater - EVT/WOTE, 2009 - usenix.org
Abstract In March 2009, the Université catholique de Louvain elected its President using a
custom deployment of the Helios web-based open-audit voting system. Out of 25,000 …

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.

D Chaum, R Carback, J Clark, A Essex, S Popoveniuc… - EVT, 2008 - usenix.org
We introduce Scantegrity II, a practical enhancement for optical scan voting systems that
achieves increased election integrity through the novel use of confirmation codes printed on …

[图书][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016 - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …

Advances in cryptographic voting systems

B Adida - 2006 - dspace.mit.edu
Democracy depends on the proper administration of popular elections. Voters should
receive assurance that their intent was correctly captured and that all eligible votes were …

[PDF][PDF] Ballot Casting Assurance via Voter-Initiated Poll Station Auditing.

J Benaloh - EVT, 2007 - usenix.org
The technology for verifiable, open-audit elections has advanced substantially since
research on this topic began a quarter century ago. Many of the problems are well …

Verifiability, privacy, and coercion-resistance: New insights from a case study

R Küsters, T Truderung, A Vogt - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
In this paper, we present new insights into central properties of voting systems, namely
verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the …

Bingo voting: Secure and coercion-free voting using a trusted random number generator

JM Bohli, J Müller-Quade, S Röhrich - … 5, 2007, Revised Selected Papers 1, 2007 - Springer
It is debatable if current direct-recording electronic voting machines can sufficiently be
trusted for a use in elections. Reports about malfunctions and possible ways of manipulation …