A review of cryptographic electronic voting

YX Kho, SH Heng, JJ Chin - Symmetry, 2022 - mdpi.com
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …

[PDF][PDF] Simple verifiable elections.

J Benaloh - EVT, 2006 - usenix.org
Much work has been done in recent decades to apply sophisticated cryptographic
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …

Atom: Horizontally scaling strong anonymity

A Kwon, H Corrigan-Gibbs, S Devadas… - Proceedings of the 26th …, 2017 - dl.acm.org
Atom is an anonymous messaging system that protects against traffic-analysis attacks.
Unlike many prior systems, each Atom server touches only a small fraction of the total …

[PDF][PDF] A survey of anonymous communication channels

G Danezis, C Diaz - 2008 - Citeseer
We present an overview of the field of anonymous communications, from its establishment in
1981 from David Chaum to today. Key systems are presented categorized according to their …

Providing receipt-freeness in mixnet-based voting protocols

B Lee, C Boyd, E Dawson, K Kim, J Yang… - Information Security and …, 2004 - Springer
It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic
voting schemes. Any kind of user chosen randomness can be used to construct a receipt …

Advances in cryptographic voting systems

B Adida - 2006 - dspace.mit.edu
Democracy depends on the proper administration of popular elections. Voters should
receive assurance that their intent was correctly captured and that all eligible votes were …

[PDF][PDF] Ballot Casting Assurance via Voter-Initiated Poll Station Auditing.

J Benaloh - EVT, 2007 - usenix.org
The technology for verifiable, open-audit elections has advanced substantially since
research on this topic began a quarter century ago. Many of the problems are well …

{XRD}: Scalable messaging system with cryptographic privacy

A Kwon, D Lu, S Devadas - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Even as end-to-end encrypted communication becomes more popular, private messaging
remains a challenging problem due to metadata leakages, such as who is communicating …

A new variant of the Matsumoto-Imai cryptosystem through perturbation

J Ding - International Workshop on Public Key Cryptography, 2004 - Springer
Though the multivariable cryptosystems first suggested by Matsumoto and Imai was
defeated by the linearization method of Patarin due to the special properties of the …

A survey on mix networks and their secure applications

K Sampigethaya, R Poovendran - Proceedings of the IEEE, 2007 - ieeexplore.ieee.org
Anonymity is a subdiscipline of information hiding, required in a number of applications,
such as in electronic voting. For network communications, anonymity can be provided by a …