Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010 - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

[PDF][PDF] A review of contemporary e-voting: Requirements, technology, systems and usability

KH Wang, SK Mondal, K Chan… - Data Science and …, 2017 - philippe-fournier-viger.com
E-voting technology has been developed for more than 30 years. However it is still distance
away from serious application. The major challenges are to provide a secure solution and to …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arxiv preprint arxiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

[KIRJA][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Coercion-resistant electronic elections

A Juels, D Catalano, M Jakobsson - … of the 2005 ACM Workshop on …, 2005 - dl.acm.org
We introduce a model for electronic election schemes that involves a more powerful
adversary than previous work. In particular, we allow the adversary to demand of coerced …

Civitas: Toward a secure voting system

MR Clarkson, S Chong… - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
Civitas is the first electronic voting system that is coercion-resistant, universally and voter
verifiable, and suitable for remote voting. This paper describes the design and …

Secret-ballot receipts: True voter-verifiable elections

D Chaum - IEEE security & privacy, 2004 - ieeexplore.ieee.org
A new kind of receipt sets a far higher standard of security by letting voters verify the election
outcome-even if all election computers and records were compromised. The system …

Efficient zero-knowledge argument for correctness of a shuffle

S Bayer, J Groth - Advances in Cryptology–EUROCRYPT 2012: 31st …, 2012 - Springer
Mix-nets are used in e-voting schemes and other applications that require anonymity.
Shuffles of homomorphic encryptions are often used in the construction of mix-nets. A shuffle …

AMOEBA: Robust location privacy scheme for VANET

K Sampigethaya, M Li, L Huang… - IEEE Journal on …, 2007 - ieeexplore.ieee.org
Communication messages in vehicular ad hoc networks (VANET) can be used to locate and
track vehicles. While tracking can be beneficial for vehicle navigation, it can also lead to …

Universal re-encryption for mixnets

P Golle, M Jakobsson, A Juels, P Syverson - Topics in Cryptology–CT …, 2004 - Springer
We introduce a new cryptographic technique that we call universal re-encryption. A
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …