[图书][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Sok: Verifiability notions for e-voting protocols

V Cortier, D Galindo, R Küsters, J Müller… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
There have been intensive research efforts in the last two decades or so to design and
deploy electronic voting (e-voting) protocols/systems which allow voters and/or external …

[PDF][PDF] An overview of the iVote 2015 voting system

I Brightwell, J Cucurull, D Galindo… - New South Wales …, 2015 - elections.nsw.gov.au
The Australian state of New South Wales (NSW) held their State General Election (SGE) on
28th March 2015. The iVote R electronic voting system was used at this election by eligible …

Advances in cryptographic voting systems

B Adida - 2006 - dspace.mit.edu
Democracy depends on the proper administration of popular elections. Voters should
receive assurance that their intent was correctly captured and that all eligible votes were …

Sub-linear zero-knowledge argument for correctness of a shuffle

J Groth, Y Ishai - Advances in Cryptology–EUROCRYPT 2008: 27th …, 2008 - Springer
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in
permuted order. Shuffles of homomorphic encryptions are a key component in mix-nets …

Malleable proof systems and applications

M Chase, M Kohlweiss, A Lysyanskaya… - Advances in Cryptology …, 2012 - Springer
Malleability for cryptography is not necessarily an opportunity for attack; in many cases it is a
potentially useful feature that can be exploited. In this work, we examine notions of …

Proofs of restricted shuffles

B Terelius, D Wikström - … : Third International Conference on Cryptology in …, 2010 - Springer
A proof of a shuffle is a zero-knowledge proof that one list of ciphertexts is a permutation and
re-encryption of another list of ciphertexts. We call a shuffle restricted if the permutation is …

A commitment-consistent proof of a shuffle

D Wikström - Australasian Conference on Information Security and …, 2009 - Springer
We introduce a pre-computation technique that drastically reduces the online computational
complexity of mix-nets based on homomorphic cryptosystems. More precisely, we show that …

SoK: techniques for verifiable mix nets

T Haines, J Müller - 2020 IEEE 33rd Computer Security …, 2020 - ieeexplore.ieee.org
Since David Chaum introduced the idea of mix nets 40 years ago, they have become widely
used building blocks for privacy-preserving protocols. Several important applications, such …

How to shuffle in public

B Adida, D Wikström - Theory of Cryptography: 4th Theory of Cryptography …, 2007 - Springer
We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public
operation. Given a trusted party that samples and obfuscates a shuffle before any ciphertexts …