International audienceAnonymity is a primary ingredient for our digital life. Several tools have been designed to address it such as, for authentication, blind signatures, group signatures or anonymous credentials and, for confidentiality, randomizable encryption or mix-nets. When it comes to complex electronic voting schemes, random shuffling of authenticated ciphertexts with mix-nets is the only known tool. However, it requires huge and complex zero-knowledge proofs to guarantee the actual permutation of the initial ciphertexts in a privacy-preserving way.In this paper, we propose a new approach for proving correct shuffling of signed ElGamal ciphertexts: the mix-servers can simply randomize individual ballots, which means the ciphertexts...
Abstract In this paper we introduce new primitives to authenticate computation on data expressed as ...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In this thesis we introduce new primitives to authenticate computation on data expressed as elements...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
© 2012 Kim RamchenCryptographic mixnets are a fundamental tool in the construction of secure electro...
Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General...
We propose a new technique for making mix nets robust, called randomized partial checking (RPC). The...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
2020, Springer Nature Switzerland AG. In this paper, we propose a new commitment key generation meth...
Abstract In this paper we introduce new primitives to authenticate computation on data expressed as ...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In this thesis we introduce new primitives to authenticate computation on data expressed as elements...
International audienceAnonymity is a primary ingredient for our digital life. Several tools have bee...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
We suggest an honest verifier zero-knowledge argument for the correctness of a shuffle of homomorphi...
© 2012 Kim RamchenCryptographic mixnets are a fundamental tool in the construction of secure electro...
Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General...
We propose a new technique for making mix nets robust, called randomized partial checking (RPC). The...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Voting is a fundamental decision making instrument in any consensus-based society. It is employed i...
2020, Springer Nature Switzerland AG. In this paper, we propose a new commitment key generation meth...
Abstract In this paper we introduce new primitives to authenticate computation on data expressed as ...
A shuffle of a set of ciphertexts is a new set of ciphertexts with the same plaintexts in permuted o...
In this thesis we introduce new primitives to authenticate computation on data expressed as elements...