Haines et al., 2023 - Google Patents
Sok: Secure e-voting with everlasting privacyHaines et al., 2023
View PDF- Document ID
- 15413974247080078028
- Author
- Haines T
- Mueller J
- Mosaheb R
- Pryvalov I
- Publication year
- Publication venue
- Privacy Enhancing Technologies Symposium (PETS)
External Links
Snippet
Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e- voting) protocols have been proposed to address this challenge, striving for everlasting …
- 240000004859 Gamochaeta purpurea 0 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chaidos et al. | BeleniosRF: A non-interactive receipt-free electronic voting scheme | |
Adida et al. | Electing a university president using open-audit voting: Analysis of real-world use of Helios | |
Kulyk et al. | Extending helios towards private eligibility verifiability | |
Juels et al. | Coercion-resistant electronic elections | |
Cortier et al. | Election verifiability for helios under weaker trust assumptions | |
Grewal et al. | Caveat coercitor: Coercion-evidence in electronic voting | |
Heiberg et al. | Improving the verifiability of the Estonian internet voting scheme | |
Haines et al. | Sok: Secure e-voting with everlasting privacy | |
Grontas et al. | Towards everlasting privacy and efficient coercion resistance in remote electronic voting | |
Achenbach et al. | Improved coercion-resistant electronic elections through deniable re-voting | |
Cortier et al. | BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme. | |
Guasch et al. | How to challenge and cast your e-vote | |
Rønne et al. | Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme | |
Li et al. | A taxonomy and comparison of remote voting schemes | |
Locher et al. | Receipt-free remote electronic elections with everlasting privacy | |
Kulyk et al. | Coercion-resistant proxy voting | |
Cortier et al. | Is the JCJ voting system really coercion-resistant? | |
Smart et al. | True trustworthy elections: remote electronic voting using trusted computing | |
Kulyk et al. | Introducing proxy voting to Helios | |
Yumeng et al. | Electronic voting: A review and taxonomy | |
Grontas et al. | Security models for everlasting privacy | |
Kiayias et al. | On the necessity of auditing for election privacy in e-voting systems | |
Doan et al. | Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections | |
Devillez et al. | Can we cast a ballot as intended and be receipt free? | |
Gong et al. | Blockchain-based threshold electronic voting system |