Grontas et al., 2019 - Google Patents
Towards everlasting privacy and efficient coercion resistance in remote electronic votingGrontas et al., 2019
View PDF- Document ID
- 2065878610404570369
- Author
- Grontas P
- Pagourtzis A
- Zacharakis A
- Zhang B
- Publication year
- Publication venue
- Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers 22
External Links
Snippet
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiability, everlasting privacy and efficient coercion resistance in the JCJ setting. Everlasting privacy is achieved assuming an anonymous channel, without resorting to …
- 240000004859 Gamochaeta purpurea 0 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dimitriou | Efficient, coercion-free and universally verifiable blockchain-based voting | |
Chaidos et al. | BeleniosRF: A non-interactive receipt-free electronic voting scheme | |
Grontas et al. | Towards everlasting privacy and efficient coercion resistance in remote electronic voting | |
Cortier et al. | Election verifiability for helios under weaker trust assumptions | |
Bernhard et al. | How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios | |
Ateniese et al. | Efficient group signatures without trapdoors | |
Kulyk et al. | Extending helios towards private eligibility verifiability | |
Chow et al. | Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. | |
Locher et al. | Coercion-resistant internet voting with everlasting privacy | |
Yi et al. | Practical internet voting system | |
Achenbach et al. | Improved coercion-resistant electronic elections through deniable re-voting | |
Araújo et al. | Towards practical and secure coercion-resistant electronic elections | |
Bulens et al. | Running {Mixnet-Based} Elections with Helios | |
Guasch et al. | How to challenge and cast your e-vote | |
Locher et al. | Receipt-free remote electronic elections with everlasting privacy | |
Haines et al. | Sok: Secure e-voting with everlasting privacy | |
Kulyk et al. | Coercion-resistant proxy voting | |
Ge et al. | Koinonia: verifiable e-voting with long-term privacy | |
Kulyk et al. | Introducing proxy voting to Helios | |
Neumann et al. | Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting | |
Hirt | Receipt-free K-out-of-L voting based on ElGamal encryption | |
Clarkson et al. | Civitas: A secure remote voting system | |
Peacock et al. | Verifiable voting systems | |
Kiayias et al. | On the necessity of auditing for election privacy in e-voting systems | |
Doan et al. | Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections |