Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
Ever since their introduction, zero-knowledge proofs have become an important tool for
addressing privacy and scalability concerns in a variety of applications. In many systems …
addressing privacy and scalability concerns in a variety of applications. In many systems …
Large-scale election based on blockchain
B Wang, J Sun, Y He, D Pang, N Lu - Procedia Computer Science, 2018 - Elsevier
Based on the blockchain, homomorphic ElGamal encryption and ring signature, an
electronic voting scheme based on blockchain is proposed for large-scale voting, which has …
electronic voting scheme based on blockchain is proposed for large-scale voting, which has …
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting
Electronic voting (e-voting) presents a convenient and cost-effective alternative to current
paper ballot-based voting. It provides many benefits such as increased voter turnout and …
paper ballot-based voting. It provides many benefits such as increased voter turnout and …
Selective comparison of verifiable online voting systems
T Finogina, J Cucurull Juan, N Costa - Security and Privacy, 2024 - Wiley Online Library
This paper aims to provide a guideline for identifying the most suitable online voting system
under the given requirements and acceptable tradeoffs. We have selected twelve (more or …
under the given requirements and acceptable tradeoffs. We have selected twelve (more or …
Belenios: a simple private and verifiable electronic voting system
We present the electronic voting protocol Belenios together with its associated voting
platform. Belenios guarantees vote privacy and full verifiability, even against a compromised …
platform. Belenios guarantees vote privacy and full verifiability, even against a compromised …
Sok: Secure e-voting with everlasting privacy
Vote privacy is a fundamental right, which needs to be protected not only during an election,
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …
Investigating usability and user experience of individually verifiable internet voting schemes
Internet voting can afford more inclusive and inexpensive elections. The flip side is that the
integrity of the election can be compromised by adversarial attacks and malfunctioning …
integrity of the election can be compromised by adversarial attacks and malfunctioning …
BeleniosVS: Secrecy and verifiability against a corrupted voting device
V Cortier, A Filipiak, J Lallemand - 2019 IEEE 32nd computer …, 2019 - ieeexplore.ieee.org
Electronic voting systems aim at two conflicting properties, namely privacy and verifiability,
while trying to minimise the trust assumptions on the various voting components. Most …
while trying to minimise the trust assumptions on the various voting components. Most …
[PDF][PDF] RedShift: Transparent SNARKs from List Polynomial Commitment IOPs.
A Kattis, K Panarin, A Vlasov - IACR Cryptol. ePrint Arch., 2019 - scholar.archive.org
We introduce an efficient transformation from univariate polynomial commitment based zk-
SNARKs to their fully transparent counterparts. The transformation is achieved with the help …
SNARKs to their fully transparent counterparts. The transformation is achieved with the help …
Thwarting last-minute voter coercion
R Giustolisi, MS Garjan… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Counter-strategies are key components of coercion-resistant voting schemes, allowing
voters to submit votes that represent their own intentions in an environment controlled by a …
voters to submit votes that represent their own intentions in an environment controlled by a …