A review of cryptographic electronic voting
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …
[PDF][PDF] Simple verifiable elections.
J Benaloh - EVT, 2006 - usenix.org
Much work has been done in recent decades to apply sophisticated cryptographic
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
Atom: Horizontally scaling strong anonymity
Atom is an anonymous messaging system that protects against traffic-analysis attacks.
Unlike many prior systems, each Atom server touches only a small fraction of the total …
Unlike many prior systems, each Atom server touches only a small fraction of the total …
[PDF][PDF] A survey of anonymous communication channels
We present an overview of the field of anonymous communications, from its establishment in
1981 from David Chaum to today. Key systems are presented categorized according to their …
1981 from David Chaum to today. Key systems are presented categorized according to their …
Providing receipt-freeness in mixnet-based voting protocols
It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic
voting schemes. Any kind of user chosen randomness can be used to construct a receipt …
voting schemes. Any kind of user chosen randomness can be used to construct a receipt …
Advances in cryptographic voting systems
B Adida - 2006 - dspace.mit.edu
Democracy depends on the proper administration of popular elections. Voters should
receive assurance that their intent was correctly captured and that all eligible votes were …
receive assurance that their intent was correctly captured and that all eligible votes were …
[PDF][PDF] Ballot Casting Assurance via Voter-Initiated Poll Station Auditing.
J Benaloh - EVT, 2007 - usenix.org
The technology for verifiable, open-audit elections has advanced substantially since
research on this topic began a quarter century ago. Many of the problems are well …
research on this topic began a quarter century ago. Many of the problems are well …
{XRD}: Scalable messaging system with cryptographic privacy
Even as end-to-end encrypted communication becomes more popular, private messaging
remains a challenging problem due to metadata leakages, such as who is communicating …
remains a challenging problem due to metadata leakages, such as who is communicating …
A new variant of the Matsumoto-Imai cryptosystem through perturbation
J Ding - International Workshop on Public Key Cryptography, 2004 - Springer
Though the multivariable cryptosystems first suggested by Matsumoto and Imai was
defeated by the linearization method of Patarin due to the special properties of the …
defeated by the linearization method of Patarin due to the special properties of the …
A survey on mix networks and their secure applications
K Sampigethaya, R Poovendran - Proceedings of the IEEE, 2007 - ieeexplore.ieee.org
Anonymity is a subdiscipline of information hiding, required in a number of applications,
such as in electronic voting. For network communications, anonymity can be provided by a …
such as in electronic voting. For network communications, anonymity can be provided by a …