Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of theoretical computer science (vol. A)
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Achieving independence efficiently and securely
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Communications of the ACM
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Secure Voting Using Partially Compatible Homomorphisms
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
How to Prevent Buying of Votes in Computer Elections
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
The Rampart Toolkit for Building High-Integrity Services
Selected Papers from the International Workshop on Theory and Practice in Distributed Systems
Incoercible multiparty computation
FOCS '96 Proceedings of the 37th Annual Symposium on Foundations of Computer Science
Verifiable secret-ballot elections
Verifiable secret-ballot elections
A robust and verifiable cryptographically secure election scheme
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Multi-authority secret-ballot elections with linear work
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Compensating for a lack of transparency
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A Secure and Efficient Key Escrow Protocol for Mobile Communications
ICCS '01 Proceedings of the International Conference on Computational Sciences-Part I
Attacks Based on Small Factors in Various Group Structures
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Electronic Jury Voting Protocols
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Cryptographic Counters and Applications to Electronic Voting
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Anonymity without 'Cryptography'
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Sharing Decryption in the Context of Voting or Lotteries
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Oblivious Counter and Majority Protocol
ISC '02 Proceedings of the 5th International Conference on Information Security
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A PVSS as Hard as Discrete Log and Shareholder Separability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Client/Server Tradeoffs for Online Elections
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Self-tallying Elections and Perfect Ballot Secrecy
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Robust Distributed Multiplicaton with out Interaction
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
Electronic Commerce Research
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
Electronic jury voting protocols
Theoretical Computer Science - Latin American theorotical informatics
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Simulating the establishment of trust infrastructures in multi-agent systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
A secure and private clarke tax voting protocol without trusted authorities
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Secure distributed human computation
Proceedings of the 6th ACM conference on Electronic commerce
Decentralized voting with unconditional privacy
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
A secure voter-resolved approval voting protocol over internet
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Proceedings of the 12th ACM conference on Computer and communications security
Coercion-resistant electronic elections
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Extended methodology of RS design and instances based on GIP
Journal of Computer Science and Technology
Discrete Applied Mathematics - Special issue: Coding and cryptography
Data Anonymity in the FOO Voting Scheme
Electronic Notes in Theoretical Computer Science (ENTCS)
A Light-Weight e-Voting System with Distributed Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
Split-ballot voting: everlasting privacy with distributed trust
Proceedings of the 14th ACM conference on Computer and communications security
Ballot casting assurance via voter-initiated poll station auditing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Bare-handed electronic voting with pre-processing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Protocol completion incentive problems in cryptographic Vickrey auctions
Electronic Commerce Research
A New Protocol for Conditional Disclosure of Secrets and Its Applications
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Efficient Disjointness Tests for Private Datasets
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Collusion-Free Protocols in the Mediated Model
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Strong Accumulators from Collision-Resistant Hashing
ISC '08 Proceedings of the 11th international conference on Information Security
Simplified Submission of Inputs to Protocols
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
A Tamper-Evident Voting Machine Resistant to Covert Channels
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Administrative and public verifiability: can we have both?
EVT'08 Proceedings of the conference on Electronic voting technology
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
EVT'08 Proceedings of the conference on Electronic voting technology
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
Unconditionally secure disjointness tests for private datasets
International Journal of Applied Cryptography
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Privacy-Friendly Electronic Traffic Pricing via Commits
Formal Aspects in Security and Trust
The Append-Only Web Bulletin Board
Formal Aspects in Security and Trust
Another Look at Extended Private Information Retrieval Protocols
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Masked Ballot Voting for Receipt-Free Online Elections
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
VeryVote: A Voter Verifiable Code Voting System
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Approach to designing bribery-free and coercion-free electronic voting scheme
Journal of Systems and Software
Identity-based threshold cryptography for electronic voting
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Proceedings of the 3rd international conference on Theory and practice of electronic governance
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A New Protocol for the Nearby Friend Problem
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Split-ballot voting: Everlasting privacy with distributed trust
ACM Transactions on Information and System Security (TISSEC)
Discrete Applied Mathematics - Special issue: Coding and cryptography
Prêt à voter: a voter-verifiable voting system
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure distributed key generation for discrete-log based cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure linear algebra using linearly recurrent sequences
TCC'07 Proceedings of the 4th conference on Theory of cryptography
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Privacy-enhanced content distribution and charging scheme using group signature
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
E-voting without 'cryptography'
FC'02 Proceedings of the 6th international conference on Financial cryptography
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
Receipt-free electronic voting scheme with a tamper-resistant randomizer
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Seeing through mist given a small fraction of an RSA private key
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Louis, Lester and Pierre: three protocols for location privacy
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Two-party computing with encrypted data
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Homomorphic encryptions of sums of groups
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Electronic voting in Belgium: past and future
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Application of dependency graphs to security protocol analysis
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
Efficient receipt-free ballot casting resistant to covert channels
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Algorithms and theory of computation handbook
Public-key encryption with efficient amortized updates
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Improved primitives for secure multiparty integer computation
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Zero-knowledge argument for simultaneous discrete logarithms
COCOON'10 Proceedings of the 16th annual international conference on Computing and combinatorics
Additive combinatorics and discrete logarithm based range protocols
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences: an International Journal
Efficient and secure generalized pattern matching via fast fourier transform
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Benaloh's dense probabilistic encryption revisited
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Running mixnet-based elections with Helios
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
E-voting: a new approach using double-blind identity-based encryption
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Adapting helios for provable ballot privacy
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
ISC'06 Proceedings of the 9th international conference on Information Security
Targeted malleability: homomorphic encryption for restricted computations
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Symbolic protocol analysis in presence of a homomorphism operator and exclusive or
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
On the security of condorcet electronic voting scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Testing disjointness of private datasets
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Secure distributed human computation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Non-interactive zero-knowledge arguments for voting
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
The VoteSecureTM secure internet voting system
iTrust'05 Proceedings of the Third international conference on Trust Management
Electronic voting: starting over?
ISC'05 Proceedings of the 8th international conference on Information Security
Multiplicative homomorphic e-voting
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Tree-Homomorphic encryption and scalable hierarchical secret-ballot elections
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Efficient cryptographic protocols realizing e-markets with price discrimination
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Theory and practice of multiparty computation
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Receipt-free universally-verifiable voting with everlasting privacy
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Honest-verifier private disjointness testing without random oracles
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Coercion-resistant electronic elections
Towards Trustworthy Elections
Receipt-free K-out-of-L voting based on elgamal encryption
Towards Trustworthy Elections
An implementation of a mix-net based network voting scheme and its use in a private organization
Towards Trustworthy Elections
The vector-ballot approach for online voting procedures
Towards Trustworthy Elections
On some incompatible properties of voting schemes
Towards Trustworthy Elections
Towards Trustworthy Elections
A verifiable voting protocol based on farnel
Towards Trustworthy Elections
Improving remote voting security with codevoting
Towards Trustworthy Elections
A practical and secure coercion-resistant scheme for internet voting
Towards Trustworthy Elections
Syntax-Driven private evaluation of quantified membership queries
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Efficient cryptographic protocol design based on distributed el gamal encryption
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
On CCA-Secure somewhat homomorphic encryption
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Efficient RSA key generation and threshold paillier in the two-party setting
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
ACM SIGAPP Applied Computing Review
TTP smartcard-based elgamal cryptosystem using threshold scheme for electronic elections
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Privacy preserving electronic data gathering
Mathematical and Computer Modelling: An International Journal
Ballot aggregation and mixnet based open-audit elections
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Shift-type homomorphic encryption and its application to fully homomorphic encryption
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Cobra: toward concurrent ballot authorization for internet voting
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Improving Helios with everlasting privacy towards the public
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
Towards a DL-based additively homomorphic encryption scheme
ISC'07 Proceedings of the 10th international conference on Information Security
An efficient and highly sound voter verification technique and its implementation
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Single layer optical-scan voting with fully distributed trust
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Practical Internet voting system
Journal of Network and Computer Applications
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Boardroom voting scheme with unconditionally secret ballots based on DC-Net
NSS'12 Proceedings of the 6th international conference on Network and System Security
Group homomorphic encryption: characterizations, impossibility results, and applications
Designs, Codes and Cryptography
Secure pattern matching using somewhat homomorphic encryption
Proceedings of the 2013 ACM workshop on Cloud computing security workshop
Distributed ElGamal à la Pedersen: Application to Helios
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Scaling privacy guarantees in code-verification elections
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Fair private set intersection with a semi-trusted arbiter
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
Journal of Computer Security - Advances in Security for Communication Networks
A more efficient computationally sound non-interactive zero-knowledge shuffle argument
Journal of Computer Security - Advances in Security for Communication Networks
Attacking and fixing Helios: An analysis of ballot secrecy
Journal of Computer Security
Hi-index | 0.00 |
In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the scheme is that the time and communication complexity for the voter is independent of the number of authorities. A voter simply posts a single encrypted message accompanied by a compact proof that it contains a valid vote. Our result is complementary to the result by Cramer, Franklin, Schoenmakers, and Yung in the sense that in their scheme the work for voters is linear in the number of authorities but can be instantiated to yield information-theoretic privacy, while in our scheme the voter's effort is independent of the number of authorities but always provides computational privacy-protection. We will also point out that the majority of proposed voting schemes provide computational privacy only (often without even considering the lack of information-theoretic privacy), and that our new scheme is by far superior to those schemes.