Networks without user observability
Computers and Security
Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking
Proceedings of the 11th USENIX Security Symposium
Fault tolerant anonymous channel
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Coercion-resistant electronic elections
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Secret-Ballot Receipts: True Voter-Verifiable Elections
IEEE Security and Privacy
Receipt-free electronic voting scheme with a tamper-resistant randomizer
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Low latency anonymity with mix rings
ISC'06 Proceedings of the 9th international conference on Information Security
Engineering a distributed e-voting system architecture: meeting critical requirements
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Hi-index | 0.00 |
This paper describes a new architecture for supporting the anonymous submission of votes in the REVS voting system. Furthermore, it enables voters to verify during the election that the electoral system processed correctly their anonymously submitted vote. This verification is a weak proof that the vote was effectively considered in the final tally. But since malicious electoral servers have no means to choose which votes should not be considered in the tally, the weak proof is strong enough for ensuring voters that the outcome of the election was not manipulated by the servers towards a particular outcome. In spite have been conceived for the REVS system, our anonymizing architecture can be used in other voting systems as well. The only requirement is that it should be possible to submit the same vote several times and to detect and drop vote replicas at the tallying phase, which is valid for other blind signature voting protocols.