Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more details on security against adaptive adversaries in the erasure-free model, and a conclusion. In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol with respect to all these requirements and it is not clear that the list of known requirements is complete. Perhaps because of this many papers on electronic voting do not offer any security proof at all. As a solution to this, we suggest evaluating voting schemes in the universal com-posability framework. We investigate the popular class of voting schemes based on homo...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
We describe the theory behind a practical voting scheme based on homomorphic encryption. We give an ...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large s...
Abstract. In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends...
This paper presents a novel unifying framework for electronic voting in the universal composability ...
Abstract. We present the first universally verifiable voting scheme that can be based on a general a...
Abstract. This paper presents a novel unifying framework for electronic voting in the universal comp...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
We describe the theory behind a practical voting scheme based on homomorphic encryption. We give an ...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large s...
Abstract. In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends...
This paper presents a novel unifying framework for electronic voting in the universal composability ...
Abstract. We present the first universally verifiable voting scheme that can be based on a general a...
Abstract. This paper presents a novel unifying framework for electronic voting in the universal comp...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...