Privacy and verifiability in voting systems: Methods, developments and trends

H Jonker, S Mauw, J Pang - Computer Science Review, 2013 - Elsevier
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …

[หนังสือ][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

PrÊt À Voter: a Voter-Verifiable Voting System

PYA Ryan, D Bismark, J Heather… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
¿¿¿¿¿¿ Pre¿ ta¿ Voter provides a practical approach to end-to-end verifiable elections with
a simple, familiar voter-experience. It assures a high degree of transparency while …

Remote electronic voting in uncontrolled environments: A classifying survey

MP Heinl, S Gölz, C Bösch - ACM Computing Surveys, 2022 - dl.acm.org
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …

Accounttrade: Accountable protocols for big data trading against dishonest consumers

T Jung, XY Li, W Huang, J Qian, L Chen… - … -IEEE Conference on …, 2017 - ieeexplore.ieee.org
We propose AccountTrade, a set of accountable protocols, for big data trading among
dishonest consumers. To secure the big data trading environment, our protocols achieve …

Selections: Internet voting with over-the-shoulder coercion-resistance

J Clark, U Hengartner - … Conference on Financial Cryptography and Data …, 2011 - Springer
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and
suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in …

A new approach towards coercion-resistant remote e-voting in linear time

O Spycher, R Koenig, R Haenni… - … Cryptography and Data …, 2012 - Springer
Remote electronic voting has attracted increasing attention in cryptographic research. A
promising protocol presented by Juels et al. is currently widely discussed. Although it offers …

Is the JCJ voting system really coercion-resistant?

V Cortier, P Gaudry, Q Yang - 2024 IEEE 37th Computer …, 2024 - ieeexplore.ieee.org
Coercion-resistance is a security property of electronic voting, often considered as a must-
have for high-stake elections. The JCJ voting scheme, proposed in 2005 by Juels, Catalano …

Accounttrade: Accountability against dishonest big data buyers and sellers

T Jung, XY Li, W Huang, Z Qiao, J Qian… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this paper, a set of accountable protocols denoted as AccountTrade is proposed for big
data trading among dishonest consumers. For achieving a secure big data trading …

Towards practical and secure coercion-resistant electronic elections

R Araújo, N Ben Rajeb, R Robbana, J Traoré… - Cryptology and Network …, 2010 - Springer
Coercion-resistance is the most effective property to fight coercive attacks in Internet
elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES …