Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Some applications of multiple key ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new multiple key cipher and an improved voting scheme
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Cryptographic protocols
Verifiable secret-ballot elections
Verifiable secret-ballot elections
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
A robust and verifiable cryptographically secure election scheme
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
SELES: An e-Voting System for Medium Scale Online Elections
ENC '05 Proceedings of the Sixth Mexican International Conference on Computer Science
Yet another improvement over the Mu-Varadharajan e-voting protocol
Computer Standards & Interfaces
Performability of a Secure Electronic Voting Algorithm
Electronic Notes in Theoretical Computer Science (ENTCS)
Performance analysis of stochastic Process algebra models using stochastic simulation
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A novel simple secure internet voting protocol
Proceedings of the 2011 International Conference on Communication, Computing & Security
Intelligent anonymous secure e-voting scheme
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Receipt-free K-out-of-L voting based on elgamal encryption
Towards Trustworthy Elections
A secure and practical electronic voting scheme
Computer Communications
Hi-index | 0.00 |
This paper presents a novel cryptographic scheme which fully conforms to the requirements of holding large scale general elections. The participants of the scheme are the voters, the candidates and the government. The scheme ensures independence between the voters in that they do not have to be present at the same time or go through several phases together; no global computation is needed. The scheme preserves the privacy of the votes against any subset of dishonest voters, and against any proper subset of dishonest candidates, including the government. Robustness is ensured in that no subset of voters can corrupt or disrupt the election. This also means that no voter is able to vote more than once without being detected. The verifiability of the scheme ensures that the government and the candidates cannot present a false tally without being caught. "Voting by telephone" is possible by employing the proposed scheme.