Abstract: We introduce an electronic election scheme, that is coercion-resistant, a notion introduced by Juels et al. in [JCJ05]. In our scheme we encrypt the credentials that serve as an authorisation to vote during registration. By using a MIX-cascade we can omit one time-consuming plaintext equivalence test in the tallying. In addition, the observer facilitates registration and voting for the benefit of the voter. Pseudonymisation of the ciphertexts during the voting period implies a permanent secrecy of the submitted votes.
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
Under the presupposition of security, privacy and transparency, electronic voting is regarded as the...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as we...
In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jak...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
International audienceThe coercion issue in remote electronic voting has always been of particular i...
Recently, Internet voting systems have gained popularity and have been used for government elections...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiabilit...
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditi...
Abstract: In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures a...
In this paper we formally study important properties of electronic voting protocols. In particular w...
Remote electronic voting over the Internet is a promising concept to afford convenience to voters an...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
Under the presupposition of security, privacy and transparency, electronic voting is regarded as the...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as we...
In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jak...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
International audienceThe coercion issue in remote electronic voting has always been of particular i...
Recently, Internet voting systems have gained popularity and have been used for government elections...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiabilit...
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditi...
Abstract: In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures a...
In this paper we formally study important properties of electronic voting protocols. In particular w...
Remote electronic voting over the Internet is a promising concept to afford convenience to voters an...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
Under the presupposition of security, privacy and transparency, electronic voting is regarded as the...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...