Public-key cryptography
A Salomaa - 2013 - books.google.com
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal
discovery in 1977 of public-key cryptography and applications in computers and …
discovery in 1977 of public-key cryptography and applications in computers and …
A review of cryptographic electronic voting
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …
A secure and optimally efficient multi‐authority election scheme
R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …
privacy, universal veriability, and robustness. It is the first scheme for which the performance …
Linkable spontaneous anonymous group signature for ad hoc groups
We present a linkable spontaneously anonymous group (LSAG) signature scheme
(alternatively known as linkable ring signature scheme) satisfying the following three …
(alternatively known as linkable ring signature scheme) satisfying the following three …
A verifiable secret shuffle and its application to e-voting
CA Neff - Proceedings of the 8th ACM conference on Computer …, 2001 - dl.acm.org
We present a mathematical construct which provides a cryptographic protocol to verifiably
shuffle a sequence of k modular integers, and discuss its application to secure, universally …
shuffle a sequence of k modular integers, and discuss its application to secure, universally …
Efficient receipt-free voting based on homomorphic encryption
M Hirt, K Sako - International Conference on the Theory and …, 2000 - Springer
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote,
and hence thwart vote-buying and coercion. We analyze the security of the multi-authority …
and hence thwart vote-buying and coercion. We analyze the security of the multi-authority …
Universal re-encryption for mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …
conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a …
Self-tallying elections and perfect ballot secrecy
Strong voter privacy, although an important property of an election scheme, is usually
compromised in election protocol design in favor of other (desirable) properties. In this work …
compromised in election protocol design in favor of other (desirable) properties. In this work …
[PDF][PDF] Simple verifiable elections.
J Benaloh - EVT, 2006 - usenix.org
Much work has been done in recent decades to apply sophisticated cryptographic
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
techniques to achieve strong end-to-end verifiability in election protocols. The properties of …
Traffic analysis attacks and trade-offs in anonymity providing systems
A Back, U Möller, A Stiglic - International Workshop on Information Hiding, 2001 - Springer
We discuss problems and trade-offs with systems providing anonymity for web browsing (or
more generally any communication system that requires low latency interaction). We focus …
more generally any communication system that requires low latency interaction). We focus …