An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the result of the election is correct or not. It is tally-hiding if it does not disclose the full election result but rather only the relevant information, such as e.g. the winner of the election. In this thesis we pursue the goal of constructing an end-to-end verifiable tally-hiding E-voting system using fully homomorphic encryption. First we construct an alteration of the GSW levelled fully homomorphic encryption scheme based on the learning with errors over rings assumption. We utilize a key homomorphic property of this scheme in order to augment the scheme by a distributed key generation and distributed decryption. This leads to a passively secu...
Online voting systems are gaining acceptance with the widespread use of secure web services and clou...
Advanced security methods are necessary to introduce effective online voting (e-voting) in the whole...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
In this paper, we propose a self-tallying election protocol based public key homomorphic encryption....
In most verifiable electronic voting schemes, one key step is the tally phase, where the election re...
The encryption of ballots is crucial to maintaining integrity and anonymity in electronic voting sch...
In this work, we investigate the general structure and the concepts behind the contemporary electron...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
We describe the theory behind a practical voting scheme based on homomorphic encryption. We give an ...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...
In this paper, we focus on the design of the winner-determination procedure of an electronic voting ...
Remote voting systems implementing the homomorphic tal- lying paradigm have proven to be the best o...
Online voting systems are gaining acceptance with the widespread use of secure web services and clou...
Advanced security methods are necessary to introduce effective online voting (e-voting) in the whole...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
In this paper, we propose a self-tallying election protocol based public key homomorphic encryption....
In most verifiable electronic voting schemes, one key step is the tally phase, where the election re...
The encryption of ballots is crucial to maintaining integrity and anonymity in electronic voting sch...
In this work, we investigate the general structure and the concepts behind the contemporary electron...
Electronic voting is one of the most interesting application of modern cryptography, as it involves ...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
We describe the theory behind a practical voting scheme based on homomorphic encryption. We give an ...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...
In this paper, we focus on the design of the winner-determination procedure of an electronic voting ...
Remote voting systems implementing the homomorphic tal- lying paradigm have proven to be the best o...
Online voting systems are gaining acceptance with the widespread use of secure web services and clou...
Advanced security methods are necessary to introduce effective online voting (e-voting) in the whole...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...