[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Haines et al., 2023 - Google Patents

Sok: Secure e-voting with everlasting privacy

Haines et al., 2023

View PDF
Document ID
15413974247080078028
Author
Haines T
Mueller J
Mosaheb R
Pryvalov I
Publication year
Publication venue
Privacy Enhancing Technologies Symposium (PETS)

External Links

Snippet

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e- voting) protocols have been proposed to address this challenge, striving for everlasting …
Continue reading at orbilu.uni.lu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation

Similar Documents

Publication Publication Date Title
Chaidos et al. BeleniosRF: A non-interactive receipt-free electronic voting scheme
Adida et al. Electing a university president using open-audit voting: Analysis of real-world use of Helios
Kulyk et al. Extending helios towards private eligibility verifiability
Juels et al. Coercion-resistant electronic elections
Cortier et al. Election verifiability for helios under weaker trust assumptions
Grewal et al. Caveat coercitor: Coercion-evidence in electronic voting
Heiberg et al. Improving the verifiability of the Estonian internet voting scheme
Haines et al. Sok: Secure e-voting with everlasting privacy
Grontas et al. Towards everlasting privacy and efficient coercion resistance in remote electronic voting
Achenbach et al. Improved coercion-resistant electronic elections through deniable re-voting
Cortier et al. BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme.
Guasch et al. How to challenge and cast your e-vote
Rønne et al. Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Li et al. A taxonomy and comparison of remote voting schemes
Locher et al. Receipt-free remote electronic elections with everlasting privacy
Kulyk et al. Coercion-resistant proxy voting
Cortier et al. Is the JCJ voting system really coercion-resistant?
Smart et al. True trustworthy elections: remote electronic voting using trusted computing
Kulyk et al. Introducing proxy voting to Helios
Yumeng et al. Electronic voting: A review and taxonomy
Grontas et al. Security models for everlasting privacy
Kiayias et al. On the necessity of auditing for election privacy in e-voting systems
Doan et al. Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections
Devillez et al. Can we cast a ballot as intended and be receipt free?
Gong et al. Blockchain-based threshold electronic voting system