Privacy-preserving data publishing: A survey of recent developments
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …
created tremendous opportunities for knowledge-and information-based decision making …
[PDF][PDF] A review of contemporary e-voting: Requirements, technology, systems and usability
E-voting technology has been developed for more than 30 years. However it is still distance
away from serious application. The major challenges are to provide a secure solution and to …
away from serious application. The major challenges are to provide a secure solution and to …
Privacy and data protection by design-from policy to engineering
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
[KIRJA][B] Introduction to cryptography
H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
Coercion-resistant electronic elections
We introduce a model for electronic election schemes that involves a more powerful
adversary than previous work. In particular, we allow the adversary to demand of coerced …
adversary than previous work. In particular, we allow the adversary to demand of coerced …
Civitas: Toward a secure voting system
Civitas is the first electronic voting system that is coercion-resistant, universally and voter
verifiable, and suitable for remote voting. This paper describes the design and …
verifiable, and suitable for remote voting. This paper describes the design and …
Secret-ballot receipts: True voter-verifiable elections
D Chaum - IEEE security & privacy, 2004 - ieeexplore.ieee.org
A new kind of receipt sets a far higher standard of security by letting voters verify the election
outcome-even if all election computers and records were compromised. The system …
outcome-even if all election computers and records were compromised. The system …
Efficient zero-knowledge argument for correctness of a shuffle
S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2012: 31st …, 2012 - Springer
Mix-nets are used in e-voting schemes and other applications that require anonymity.
Shuffles of homomorphic encryptions are often used in the construction of mix-nets. A shuffle …
Shuffles of homomorphic encryptions are often used in the construction of mix-nets. A shuffle …
AMOEBA: Robust location privacy scheme for VANET
K Sampigethaya, M Li, L Huang… - IEEE Journal on …, 2007 - ieeexplore.ieee.org
Communication messages in vehicular ad hoc networks (VANET) can be used to locate and
track vehicles. While tracking can be beneficial for vehicle navigation, it can also lead to …
track vehicles. While tracking can be beneficial for vehicle navigation, it can also lead to …
Universal re-encryption for mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …