We develop cryptographically secure techniques to guarantee unconditional privacy for respondents to polls. Our constructions are efficient and practical, and are shown not to allow cheating respondents to affect the "tally" by more than their own vote --- which will be given the exact same weight as that of other respondents. We demonstrate solutions to this problem based on both traditional cryptographic techniques and quantum cryptography
We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this...
One of the main goals of cryptographic protocols is to combine fault tolerance and privacy, under as...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Abstract. We formalize the notion of a cryptographic counter, which allows a group of participants t...
We describe quantum protocols for voting and surveying. A key feature of our schemes is the use of e...
Computer based voting brings up huge challenges for technology. On the one hand an electronic voting...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
Voting is one of the most prominent components of democracy. The one-vote veto, which requires the v...
International audienceWe propose a new measure for privacy of votes. Our measure relies on computati...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. We adapt the Cramer, Franklin, Schoenmaker and Yung internet voting proto-col[12] to the b...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this...
One of the main goals of cryptographic protocols is to combine fault tolerance and privacy, under as...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Abstract. We formalize the notion of a cryptographic counter, which allows a group of participants t...
We describe quantum protocols for voting and surveying. A key feature of our schemes is the use of e...
Computer based voting brings up huge challenges for technology. On the one hand an electronic voting...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
Voting is one of the most prominent components of democracy. The one-vote veto, which requires the v...
International audienceWe propose a new measure for privacy of votes. Our measure relies on computati...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. We adapt the Cramer, Franklin, Schoenmaker and Yung internet voting proto-col[12] to the b...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
We propose a new encryption primitive, commitment consistent encryption (CCE), and instances of this...
One of the main goals of cryptographic protocols is to combine fault tolerance and privacy, under as...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...