Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
A discrete logarithm implementation of perfect zero-knowledge blobs
Journal of Cryptology
Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Secure Voting Using Partially Compatible Homomorphisms
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
How to Prevent Buying of Votes in Computer Elections
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Using Non-interactive Proofs to Achieve Independence Efficiently and Securely
Using Non-interactive Proofs to Achieve Independence Efficiently and Securely
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Compensating for a lack of transparency
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Funkspiel schemes: an alternative to conventional tamper resistance
Proceedings of the 7th ACM conference on Computer and communications security
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Almost entirely correct mixing with applications to voting
Proceedings of the 9th ACM conference on Computer and communications security
Cryptanalysis on Mu--Varadharajan's e-voting schemes
Applied Mathematics and Computation
Electronic Jury Voting Protocols
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
An Efficient Scheme for Proving a Shuffle
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The Security of a Mix-Center Based on a Semantically Secure Cryptosystem
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Commital Deniable Proofs and Electronic Campaign Finance
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Mix and Match: Secure Function Evaluation via Ciphertexts
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Optimistic Mixing for Exit-Polls
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
Lenient/Strict Batch Verification in Several Groups
ISC '01 Proceedings of the 4th International Conference on Information Security
Receipt-Free Sealed-Bid Auction
ISC '02 Proceedings of the 5th International Conference on Information Security
Remarks on Mix-Network Based on Permutation Networks
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Self-tallying Elections and Perfect Ballot Secrecy
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
A simple on-line voting scheme
ICCC '02 Proceedings of the 15th international conference on Computer communication
Electronic Commerce Research
Electronic jury voting protocols
Theoretical Computer Science - Latin American theorotical informatics
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
A secure voter-resolved approval voting protocol over internet
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Coercion-resistant electronic elections
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A Light-Weight e-Voting System with Distributed Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
Batch zero-knowledge proof and verification and its applications
ACM Transactions on Information and System Security (TISSEC)
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
Ballot casting assurance via voter-initiated poll station auditing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Bare-handed electronic voting with pre-processing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Simplified Submission of Inputs to Protocols
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Helios: web-based open-audit voting
SS'08 Proceedings of the 17th conference on Security symposium
VoteBox: a tamper-evident, verifiable electronic voting system
SS'08 Proceedings of the 17th conference on Security symposium
Administrative and public verifiability: can we have both?
EVT'08 Proceedings of the conference on Electronic voting technology
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
EVT'08 Proceedings of the conference on Electronic voting technology
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
Batch Processing for Proofs of Partial Knowledge and Its Applications
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Secure Multiparty Computation for Comparator Networks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Verifiable Rotation of Homomorphic Encryptions
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Information Sciences: an International Journal
A Commitment-Consistent Proof of a Shuffle
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Masked Ballot Voting for Receipt-Free Online Elections
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Improving and Simplifying a Variant of Prêt à Voter
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Identity-based mix: Anonymous communications without public key certificates
Computers and Electrical Engineering
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Deterring voluntary trace disclosure in re-encryption mix-networks
ACM Transactions on Information and System Security (TISSEC)
Survey on anonymous communications in computer networks
Computer Communications
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Prêt à voter: a voter-verifiable voting system
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Multi-authority secret-ballot elections with linear work
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Efficient receipt-free voting based on homomorphic encryption
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
How to break a practical MIX and design a new one
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Flaws in some robust optimistic mix-nets
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Practical and secure solutions for integer comparison
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
TCC'07 Proceedings of the 4th conference on Theory of cryptography
An implementation of a universally verifiable electronic voting scheme based on shuffling
FC'02 Proceedings of the 6th international conference on Financial cryptography
Receipt-free electronic voting scheme with a tamper-resistant randomizer
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A non-interactive shuffle with pairing based verifiability
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Information-theoretic security without an honest majority
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
An efficient aggregate shuffle argument scheme
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Threat analysis of a practical voting scheme with receipts
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
CodeVoting protection against automatic vote manipulation in an uncontrolled environment
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Sub-linear zero-knowledge argument for correctness of a shuffle
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Electing a university president using open-audit voting: analysis of real-world use of Helios
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Efficient receipt-free ballot casting resistant to covert channels
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Accountability: definition and relationship to verifiability
Proceedings of the 17th ACM conference on Computer and communications security
Algorithms and theory of computation handbook
Parallel shuffling and its application to prêt à voter
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Eperio: mitigating technical complexity in cryptographic election verification
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences: an International Journal
Deniable encryption with negligible detection probability: an interactive construction
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Running mixnet-based elections with Helios
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Secure internet voting on limited devices with anonymized DSA public keys
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Practical remote end-to-end voting scheme
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
ISC'06 Proceedings of the 9th international conference on Information Security
A sender verifiable mix-net and a new proof of a shuffle
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
SP'04 Proceedings of the 12th international conference on Security Protocols
Intelligent anonymous secure e-voting scheme
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Some remarks on universal re-encryption and a novel practical anonymous tunnel
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Multiplicative homomorphic e-voting
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Protection profile for secure e-voting systems
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Tree-Homomorphic encryption and scalable hierarchical secret-ballot elections
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
An efficient publicly verifiable mix-net for long inputs
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Receipt-free universally-verifiable voting with everlasting privacy
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Coercion-resistant electronic elections
Towards Trustworthy Elections
Receipt-free K-out-of-L voting based on elgamal encryption
Towards Trustworthy Elections
An implementation of a mix-net based network voting scheme and its use in a private organization
Towards Trustworthy Elections
The vector-ballot approach for online voting procedures
Towards Trustworthy Elections
Towards Trustworthy Elections
Polling with physical envelopes: a rigorous analysis of a human-centric protocol
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A protocol for anonymous and accurate e-polling
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
A new approach towards coercion-resistant remote e-voting in linear time
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Efficient zero-knowledge argument for correctness of a shuffle
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Malleable proof systems and applications
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
A secure and practical electronic voting scheme
Computer Communications
Ballot aggregation and mixnet based open-audit elections
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Efficiently shuffling in public
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Cryptanalysis of a universally verifiable efficient re-encryption mixnet
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Improving Helios with everlasting privacy towards the public
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Measuring vote privacy, revisited
Proceedings of the 2012 ACM conference on Computer and communications security
Allowing continuous evaluation of citizen opinions through social networks
EGOVIS'12/EDEM'12 Proceedings of the 2012 Joint international conference on Electronic Government and the Information Systems Perspective and Electronic Democracy, and Proceedings of the 2012 Joint international conference on Advancing Democracy, Government and Governance
The norwegian internet voting protocol
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Feasibility analysis of Prêt à voter for german federal elections
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Practical Internet voting system
Journal of Network and Computer Applications
A mix-net from any CCA2 secure cryptosystem
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Randomized partial checking revisited
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Defining verifiability in e-auction protocols
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Review: An overview of anonymity technology usage
Computer Communications
Batch proofs of partial knowledge
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Prêt à voter providing everlasting privacy
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Hi-index | 0.00 |
We present a receipt-free voting scheme based on a mixtype anonymous channel[Cha81, PIK93]. The receipt-freeness property [BT94] enables voters to hide how they have voted even from a powerful adversary who is trying to coerce him. The work of [BT94] gave the first solution using a voting booth, which is a hardware assumption not unlike that in current physical elections. In our proposed scheme, we reduce the physical assumptions required to obtain receipt-freeness. Our sole physical assumption is the existence of a private channel through which the center can send the voter a message without fear of eavesdropping.