Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security considerations in e-cognocracy
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Hi-index | 0.00 |
Web-based on-line voting and on-line election systems provide benefits of usability, manageability and security. A particular workflow in any phase of on-line election process can be modeled and implemented securely by employing basic security applications readily provided by well established cryptographic technologies. By analyzing data-flow between different phases in the workflow, secure processes can be implemented using Web, database and cryptographic techniques. The implementation has to deliver a system that provides performance properties mandatory of an on-line election system of authentication, democracy, anonymity, non-coercion, accuracy, reliability, veracity, verifiability, neutrality, and likability.