Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Cryptographic capsules: a disjunctive primitive for interactive protocols
Proceedings on Advances in cryptology---CRYPTO '86
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Achieving independence efficiently and securely
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Secure Voting Using Partially Compatible Homomorphisms
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Verifiable secret-ballot elections
Verifiable secret-ballot elections
A robust and verifiable cryptographically secure election scheme
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Compensating for a lack of transparency
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Electronic Jury Voting Protocols
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Cryptographic Counters and Applications to Electronic Voting
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Anonymity without 'Cryptography'
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Client/Server Tradeoffs for Online Elections
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Self-tallying Elections and Perfect Ballot Secrecy
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
A simple on-line voting scheme
ICCC '02 Proceedings of the 15th international conference on Computer communication
Electronic jury voting protocols
Theoretical Computer Science - Latin American theorotical informatics
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Simulating the establishment of trust infrastructures in multi-agent systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
A secure and private clarke tax voting protocol without trusted authorities
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
A secure voter-resolved approval voting protocol over internet
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
OACerts: Oblivious Attribute Certificates
IEEE Transactions on Dependable and Secure Computing
Data Anonymity in the FOO Voting Scheme
Electronic Notes in Theoretical Computer Science (ENTCS)
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Split-ballot voting: everlasting privacy with distributed trust
Proceedings of the 14th ACM conference on Computer and communications security
International Journal of Information and Computer Security
Homomorphic Encryption with CCA Security
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
EVT'08 Proceedings of the conference on Electronic voting technology
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Split-ballot voting: Everlasting privacy with distributed trust
ACM Transactions on Information and System Security (TISSEC)
Prêt à voter: a voter-verifiable voting system
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Voting with unconditional privacy by merging Prêt à voter and PunchScan
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Efficient receipt-free voting based on homomorphic encryption
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
E-voting without 'cryptography'
FC'02 Proceedings of the 6th international conference on Financial cryptography
Receipt-free electronic voting scheme with a tamper-resistant randomizer
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Information-theoretic security without an honest majority
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Algorithms and theory of computation handbook
Public-key encryption with efficient amortized updates
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Design and analysis of "flexible" k-out-of-n signatures
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences: an International Journal
Frontiers of Computer Science in China
Benaloh's dense probabilistic encryption revisited
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
ISC'06 Proceedings of the 9th international conference on Information Security
On the security of condorcet electronic voting scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
You can prove so many things in zero-knowledge
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
OACerts: oblivious attribute certificates
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
The VoteSecureTM secure internet voting system
iTrust'05 Proceedings of the Third international conference on Trust Management
Multiplicative homomorphic e-voting
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Tree-Homomorphic encryption and scalable hierarchical secret-ballot elections
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Receipt-free universally-verifiable voting with everlasting privacy
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Towards Trustworthy Elections
Receipt-free K-out-of-L voting based on elgamal encryption
Towards Trustworthy Elections
Unconditionally secure electronic voting
Towards Trustworthy Elections
The vector-ballot approach for online voting procedures
Towards Trustworthy Elections
On some incompatible properties of voting schemes
Towards Trustworthy Elections
Towards Trustworthy Elections
Efficient binary conversion for paillier encrypted values
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Convertible ring signatures with gradual revelation of non-signers
Security and Communication Networks
Shift-type homomorphic encryption and its application to fully homomorphic encryption
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Using Prêt à Voter in Victorian state elections
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Improving Helios with everlasting privacy towards the public
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
The norwegian internet voting protocol
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
An improved electronic voting scheme without a trusted random number generator
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Boardroom voting scheme with unconditionally secret ballots based on DC-Net
NSS'12 Proceedings of the 6th international conference on Network and System Security
Group homomorphic encryption: characterizations, impossibility results, and applications
Designs, Codes and Cryptography
Attacking and fixing Helios: An analysis of ballot secrecy
Journal of Computer Security
Hi-index | 0.00 |
We present new cryptographic protocols for multiauthority secret ballot elections that guarantee privacy, robustness, and universal verifiability. Application of some novel techniques, in particular the construction of witness hiding/indistinguishable protocols from Cramer, Damgård and Schoenmakers, and the verifiable secret sharing scheme of Pedersen, reduce the work required by the voter or an authority to a linear number of cryptographic operations in the population size (compared to quadratic in previous schemes). Thus we get significantly closer to a practical election scheme.