Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption. This thesis proposes adding voter verification to an existing multi-candidate election scheme (Baudron et al.) that uses Paillier encryption. A “cut and choose” protocol provides a probabilistic guarantee of correctness. The scheme is straightforward, and...
Remote voting systems implementing the homomorphic tal- lying paradigm have proven to be the best o...
A number of voter-verifiable electronic voting schemes have been introduced in the recent decades. T...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Today cryptography is an important part over the internet communication. Voting is one of the most i...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
peer reviewedOne crucial aspect of any verifiable electronic voting system that uses encryption is t...
In this work, we investigate the general structure and the concepts behind the contemporary electron...
Cryptology ePrint Archive: Report 2021/491https://eprint.iacr.org/2021/491International audienceIn m...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
Remote voting systems implementing the homomorphic tal- lying paradigm have proven to be the best o...
A number of voter-verifiable electronic voting schemes have been introduced in the recent decades. T...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity o...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Today cryptography is an important part over the internet communication. Voting is one of the most i...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
peer reviewedOne crucial aspect of any verifiable electronic voting system that uses encryption is t...
In this work, we investigate the general structure and the concepts behind the contemporary electron...
Cryptology ePrint Archive: Report 2021/491https://eprint.iacr.org/2021/491International audienceIn m...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that...
We present the cryptographic primitives needed in the construction of electronic voting systems base...
Remote voting systems implementing the homomorphic tal- lying paradigm have proven to be the best o...
A number of voter-verifiable electronic voting schemes have been introduced in the recent decades. T...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...