Public-key cryptography

A Salomaa - 2013 - books.google.com
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal
discovery in 1977 of public-key cryptography and applications in computers and …

A review of cryptographic electronic voting

YX Kho, SH Heng, JJ Chin - Symmetry, 2022 - mdpi.com
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …

A secure and optimally efficient multi‐authority election scheme

R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …

Linkable spontaneous anonymous group signature for ad hoc groups

JK Liu, VK Wei, DS Wong - … , ACISP 2004, Sydney, Australia, July 13-15 …, 2004 - Springer
We present a linkable spontaneously anonymous group (LSAG) signature scheme
(alternatively known as linkable ring signature scheme) satisfying the following three …

A verifiable secret shuffle and its application to e-voting

CA Neff - Proceedings of the 8th ACM conference on Computer …, 2001 - dl.acm.org
We present a mathematical construct which provides a cryptographic protocol to verifiably
shuffle a sequence of k modular integers, and discuss its application to secure, universally …

Efficient receipt-free voting based on homomorphic encryption

M Hirt, K Sako - International Conference on the Theory and …, 2000 - Springer
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote,
and hence thwart vote-buying and coercion. We analyze the security of the multi-authority …

Universal re-encryption for mixnets

P Golle, M Jakobsson, A Juels, P Syverson - Topics in Cryptology–CT …, 2004 - Springer
We introduce a new cryptographic technique that we call universal re-encryption. A
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …

Self-tallying elections and perfect ballot secrecy

A Kiayias, M Yung - International Workshop on Public Key Cryptography, 2002 - Springer
Strong voter privacy, although an important property of an election scheme, is usually
compromised in election protocol design in favor of other (desirable) properties. In this work …

[PDF][PDF] Simple verifiable elections.

J Benaloh - EVT, 2006 - usenix.org
Much work has been done in recent decades to apply sophisticated cryptographic
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …

Traffic analysis attacks and trade-offs in anonymity providing systems

A Back, U Möller, A Stiglic - International Workshop on Information Hiding, 2001 - Springer
We discuss problems and trade-offs with systems providing anonymity for web browsing (or
more generally any communication system that requires low latency interaction). We focus …