In e-voting protocols, cryptographers must balance usability with strong security guarantees, such as privacy and verifiability. In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes the tally. Some protocols replace the trusted authority by a set of authorities, and privacy is guaranteed if less than a threshold number of authorities are corrupt. For verifiability, stronger security is demanded. Typically, corrupt authorities that try to fake the tally result must always be detected.To provide verifiability, many e-voting protocols use Non-Interactive Zero-Knowledge proofs (NIZK). Thanks to their non-interactive nature, NIZK allow anybody, including third parties that do not ...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
While machine-assisted verification of classical security goals such as confidentiality and authenti...
In this paper we propose a new voting protocol with desirable security properties. The voting stage ...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
Abstract. We present the first universally verifiable voting scheme that can be based on a general a...
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-to-end ver...
Electronic voting presents many challenges due to its multiple security requirements. Some of the ch...
An Internet voting scheme allows voters to cast their votes or ballots over Internet. Several inform...
Abstract. This paper presents a novel unifying framework for electronic voting in the universal comp...
In this paper, we discuss one particular feature of Internet voting, verifiability, against the back...
Abstract. In this paper, we study the problem of simultaneously achieving several se-curity properti...
This paper proposes a new electronic voting (e-voting) scheme that fulfills all the security require...
End-to-end (E2E) verifiability is critical if e-voting systems are to be adopted for use in real-wor...
Electronic voting typically aims at two main security goals: vote privacy and verifiability. These t...
Verifiable electronic voting promises to ensure the correctness of elections even in the presence of...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
While machine-assisted verification of classical security goals such as confidentiality and authenti...
In this paper we propose a new voting protocol with desirable security properties. The voting stage ...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
Abstract. We present the first universally verifiable voting scheme that can be based on a general a...
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-to-end ver...
Electronic voting presents many challenges due to its multiple security requirements. Some of the ch...
An Internet voting scheme allows voters to cast their votes or ballots over Internet. Several inform...
Abstract. This paper presents a novel unifying framework for electronic voting in the universal comp...
In this paper, we discuss one particular feature of Internet voting, verifiability, against the back...
Abstract. In this paper, we study the problem of simultaneously achieving several se-curity properti...
This paper proposes a new electronic voting (e-voting) scheme that fulfills all the security require...
End-to-end (E2E) verifiability is critical if e-voting systems are to be adopted for use in real-wor...
Electronic voting typically aims at two main security goals: vote privacy and verifiability. These t...
Verifiable electronic voting promises to ensure the correctness of elections even in the presence of...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
While machine-assisted verification of classical security goals such as confidentiality and authenti...
In this paper we propose a new voting protocol with desirable security properties. The voting stage ...