The uncoercibility to prevent rigging in e-voting and e-auction have been studied in different literatures. It is realized that the notion of a virtual booth and untappable channel are required to prevent coerciveness. Virtual booth protects the candidates to cast their private values without being observed by the adversary/coercer. However the adversary can influence the candidates after their casting. Adversary used to acquire the encrypted votes/bids either from the colluded authorities (voting server, auctioneer) or by eavesdropping the communicating channel and coerces the candidates to disclose their private values with the private keys and verifies whether the ciphers are the encryption of the private values. In the prior literatures...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. It had been thought that it is difficult to provide receiptfreeness in mixnet-based electr...
In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiabl...
ABSTRACT The uncoercibility to prevent rigging in e-voting and e-auction have been studied in differ...
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditi...
Abstract—Deniable encryption is an important cryptographic primitive, essential in all cryptographic...
. Consider a situation in which the transmission of encrypted messages is intercepted by an adversar...
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as we...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Coercion resistance is one of the most important features of a secure voting procedure. Because of t...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. It had been thought that it is difficult to provide receiptfreeness in mixnet-based electr...
In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiabl...
ABSTRACT The uncoercibility to prevent rigging in e-voting and e-auction have been studied in differ...
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditi...
Abstract—Deniable encryption is an important cryptographic primitive, essential in all cryptographic...
. Consider a situation in which the transmission of encrypted messages is intercepted by an adversar...
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as we...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Coercion resistance is one of the most important features of a secure voting procedure. Because of t...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. It had been thought that it is difficult to provide receiptfreeness in mixnet-based electr...
In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiabl...