We present the cryptographic primitives needed in the construction of electronic voting systems based on homomorphic encryptions and on verifiable secret sharing. Then "The theory and implementation of an electronic voting system" by Ivan Damgård, Jens Groth and Gorm Salomonsen is presented as an example of electronic voting systems based on homomorphic encryptions, while "Multi-authority secret-ballot election with linear work" by Ronald Cramer, Matthew Franklin, Berry Schoenmakers and Moti Yung is presented as an example of electronic voting systems based on verifiable secret sharing. Moreover, the mathematical background for these systems are studied with particular emphasis on the security issues of the relevant sub-protocols. Comparing...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this thesis,...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
We describe the theory behind a practical voting scheme based on homomorphic encryption. We give an ...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
We survey the contributions of the entire theoretical computer science/cryptography community during...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryp...
In this work, we investigate the general structure and the concepts behind the contemporary electron...
Abstract— This paper is delivered to improve the online voting process by enhancing security using h...
The future of elections seems to be electronic voting systems du to its advantatges over the traditi...
Online voting systems are gaining acceptance with the widespread use of secure web services and clou...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this thesis,...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
We describe the theory behind a practical voting scheme based on homomorphic encryption. We give an ...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
We survey the contributions of the entire theoretical computer science/cryptography community during...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryp...
In this work, we investigate the general structure and the concepts behind the contemporary electron...
Abstract— This paper is delivered to improve the online voting process by enhancing security using h...
The future of elections seems to be electronic voting systems du to its advantatges over the traditi...
Online voting systems are gaining acceptance with the widespread use of secure web services and clou...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this thesis,...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...