M Graf, R Küsters, D Rausch - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
While accountability is a well-known concept in distributed systems and cryptography, in the literature on blockchains (and, more generally, distributed ledgers) the formal treatment of …
Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …
R Küsters, J Liedtke, J Müller… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Modern electronic voting systems (e-voting systems) are designed to provide not only vote privacy but also (end-to-end) verifiability. Several verifiable e-voting systems have been …
Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting …
R Giustolisi, MS Garjan… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submit votes that represent their own intentions in an environment controlled by a …
Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of the election can be compromised by adversarial attacks and malfunctioning …
V Cortier, P Gaudry, Q Yang - 2024 IEEE 37th Computer …, 2024 - ieeexplore.ieee.org
Coercion-resistance is a security property of electronic voting, often considered as a must- have for high-stake elections. The JCJ voting scheme, proposed in 2005 by Juels, Catalano …
A number of e-voting systems have been proposed in the last decades, attracting the interest of the research community. The challenge is far from being fully addressed, especially for …
O Friedman, A Marmor, D Mutzari, YC Scaly… - Cryptology ePrint …, 2023 - eprint.iacr.org
In the threshold version of Paillier's encryption scheme, a set of parties collectively holds the secret decryption key through a secret sharing scheme. Whenever a ciphertext is to be …