Democracy depends on the proper administration of popular elections. Voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. The election system as a whole should ensure that voter coercion is unlikely, even when voters are willing to be influenced. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted? This dissertation explores cryptographic techniques for implementing verifiable, secret-ballot elections. We present the power of cryptographic voting, in particular its ability to successfully achieve both verifiability and b...
One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
We survey the contributions of the entire theoretical computer science/cryptography community during...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Mo...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Electronic voting consistently fails to supplant conventional paper ballot due to a plethora of secu...
In this dissertation we study the problem of making electronic voting trustworthy through the use of...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
peer reviewedOne crucial aspect of any verifiable electronic voting system that uses encryption is t...
One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
We survey the contributions of the entire theoretical computer science/cryptography community during...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Mo...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
Electronic voting consistently fails to supplant conventional paper ballot due to a plethora of secu...
In this dissertation we study the problem of making electronic voting trustworthy through the use of...
Electronic voting systems are increasingly used in electoral processes ranging from specialized stan...
peer reviewedOne crucial aspect of any verifiable electronic voting system that uses encryption is t...
One crucial aspect of any verifiable electronic voting system that uses encryption is the proof that...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
We survey the contributions of the entire theoretical computer science/cryptography community during...