Abstract:- Electronic voting protocols are a reasonable alternative to conventional elections. Nevertheless, they are facing an evolution due to its requirements, especially the ones needed to provide full security considered to represent a democratic electronic vote. Different algorithms, based on public key schemes, have been proposed in the literature to meet these security requirements. We propose the use of threshold cryptography and bilinear pairings in order to provide the security requirements that an electronic voting protocol must meet, without requiring the entire infrastructure needed in a public key scheme. We make a comparative analysis of our proposal with other electronic voting protocols. It is based in their performance an...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
This work deals with electronic elections and votingsystems. The paper presents a secure electronic ...
In this paper we present how multi-party designated verifier signatures can be used as generic solut...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large s...
In 1997, Cranor and Cytron proposed an electronic voting protocol, Sensus protocol, intended to be a...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in...
Abstract: In this paper we present how multi-party designated verifier signatures can be used as gen...
In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem....
Electronic voting is done by recording election data centrally and presenting it into fast digital i...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
[[abstract]]Voter anonymity and voting correctness are important issues for electronic voting mecha...
c©2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
This work deals with electronic elections and votingsystems. The paper presents a secure electronic ...
In this paper we present how multi-party designated verifier signatures can be used as generic solut...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large s...
In 1997, Cranor and Cytron proposed an electronic voting protocol, Sensus protocol, intended to be a...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in...
Abstract: In this paper we present how multi-party designated verifier signatures can be used as gen...
In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem....
Electronic voting is done by recording election data centrally and presenting it into fast digital i...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
[[abstract]]Voter anonymity and voting correctness are important issues for electronic voting mecha...
c©2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
This work deals with electronic elections and votingsystems. The paper presents a secure electronic ...
In this paper we present how multi-party designated verifier signatures can be used as generic solut...