T Haines, J Mueller, R Mosaheb… - Proceedings on Privacy …, 2023 - orbilu.uni.lu
[en] Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic …
C Meter - arXiv preprint arXiv:1702.02566, 2017 - arxiv.org
Countries like Estonia, Norway or Australia developed electronic voting systems, which could be used to realize parliamentary elections with the help of personal computers and the …
We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this primitive that enable building the first universally verifiable voting schemes …
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiability, everlasting privacy and efficient coercion resistance in the JCJ setting …
S Delaune, L Hirschi - Journal of Logical and Algebraic Methods in …, 2017 - Elsevier
Cryptographic protocols aim at securing communications over insecure networks such as the Internet, where dishonest users may listen to communications and interfere with them. A …
Real-world elections often require threshold cryptosystems so that any t out of l trustees can proceed to tallying. This is needed to protect the confidentiality of the voters' votes against …
P Locher, R Haenni, RE Koenig - … 26, 2016, Revised Selected Papers 20, 2016 - Springer
The cryptographic voting protocol presented in this paper offers public verifiability, everlasting privacy, and coercion-resistance simultaneously. Voters are authenticated …
E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their …
We show how to combine the individual verification mechanism of Selene with the coercion- resistant e-voting scheme from Juels, Catalano and Jakobsson (JCJ). This results in an e …