Haze: Privacy-preserving real-time traffic statistics

JWS Brown, O Ohrimenko, R Tamassia - Proceedings of the 21st ACM …, 2013 - dl.acm.org
We consider mobile applications that let users learn traffic conditions based on reports from
other users. However, the providers of these mobile services have access to such sensitive …

Extending the tally-hiding ordinos system: implementations for Borda, Hare-Niemeyer, condorcet, and instant-runoff voting

F Hertel, N Huber, J Kittelberger, R Küsters… - Cryptology ePrint …, 2021 - eprint.iacr.org
Modern electronic voting systems (e-voting systems) are designed to achieve a variety of
security properties, such as verifiability, accountability, and vote privacy. Some of these …

When is a test not a proof?

E McMurtry, O Pereira, V Teague - … 2020, Guildford, UK, September 14–18 …, 2020 - Springer
A common primitive in election and auction protocols is a plaintext equivalence test (PET) in
which two ciphertexts are tested for equality of their plaintexts, and a verifiable proof of the …

[PDF][PDF] Survey on electronic voting schemes

L Fouard, M Duclos, P Lafourcade - supported by the ANR …, 2007 - luca-giuzzi.unibs.it
We present a survey on electronic voting schemes. We first summarize properties than such
protocols should guarantee. In a second time we describe cryptographic primitives used in …

Ballot secrecy and ballot independence coincide

B Smyth, D Bernhard - Computer Security–ESORICS 2013: 18th European …, 2013 - Springer
We study ballot independence for election schemes: We formally define ballot
independence as a cryptographic game and prove that ballot secrecy implies ballot …

Surveying definitions of coercion resistance

T Haines, B Smyth - Cryptology ePrint Archive, 2019 - eprint.iacr.org
We explore formal definitions of coercion resistance (WPES'05, FC'09, CRYPTO'10, and
CSF'10), conceived to capture the strongest privacy notions achievable by voting systems …

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios

B Smyth - Journal of Computer Security, 2021 - content.iospress.com
We propose a definition of ballot secrecy as an indistinguishability game in the
computational model of cryptography. Our definition improves upon earlier definitions to …

[PDF][PDF] A coercion-resistant cryptographic voting protocol-evaluation and prototype implementation

S Weber - Darmstadt University of Technology, http://www. cdc …, 2006 - researchgate.net
Voting technology and procedures evolved throughout the history of mankind-from clay balls
put in clay pots in ancient Greek, over paper ballots in the arising democratic societies, to the …

Protocol completion incentive problems in cryptographic Vickrey auctions

PG Bradford, S Park, MH Rothkopf, H Park - Electronic Commerce …, 2008 - Springer
Despite attractive theoretical properties, Vickrey auctions are seldom used due to the risk of
information revelation and fear of cheating. CVAs (Cryptographic Vickrey Auctions) have …

Ballot secrecy with malicious bulletin boards

D Bernhard, B Smyth - Cryptology ePrint Archive, 2014 - eprint.iacr.org
We propose a definition of ballot secrecy in the computational model of cryptography. The
definition builds upon and strengthens earlier definitions by Bernhard et al.(ASIACRYPT'12 …