搜索结果: 16-30 共查到“军事学 Voting”相关记录77条 . 查询时间(0.014 秒)
Estonian Voting Verification Mechanism Revisited Again
Electronic voting vote verification
2017/2/20
Recently, Muş, Kiraz, Cenk and Sertkaya proposed an improvement over the present Estonian Internet voting vote verification scheme. This paper points to the weaknesses and questionable design cho...
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Boardroom Voting Maximum Voter Privacy
2017/2/20
We present the first implementation of a decentralised and self-tallying internet voting protocol with maximum voter privacy using the Blockchain. The Open Vote Network is suitable for boardroom elec-...
These lecture notes survey some of the main ideas and tech- niques used in cryptographic voting systems. The write-up is geared to- wards readers with little knowledge of cryptography and it focuses o...
Homomorphic Tallying for the Estonian Internet Voting System
cryptographic protocols Estonian Internet Voting System
2016/12/10
In this paper we study the feasibility of using homomorphic tallying in the
Estonian Internet voting system. The paper analyzes the security benefits provided
by homomorphic tallying, the costs intr...
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
e-voting verifiability witness indistinguishability
2016/12/8
In e-voting protocol design, cryptographers must balance usability and strong security guarantees, such as privacy and verifiability. In traditional e-voting protocols, privacy is often provided by a ...
Decryption phase in Norwegian electronic voting
electronic voting protocols verifiable shuffle
2016/12/8
We describe an efficient and secure decryption protocol to the
Norwegian Internet voting project. We first adapt Groth’s shuffledecryption
from 2010 to our purpose, and we prove all security
proper...
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
cryptographic protocols evoting
2016/12/7
We present security vulnerabilities in the remote voting system Helios. We propose Apollo, a modified version of Helios, which addresses these vulnerabilities and could improve the feasibility of inte...
After the Estonian Parliamentary Elections held in 2011, an additional verication mechanism was integrated into the i-voting system in order to resist corrupted voting devices, including the so calle...
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
Verifiable E-Voting End-to-End Verifiability E2E
2016/7/5
Nearly all verifiable e-voting schemes require trusted tallying
authorities to guarantee voter privacy. An exception is the DRE-i
system which removes this requirement by pre-computing all encrypted...
We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and...
sElect: A Lightweight Verifiable Remote Voting System
e-voting verifiability protocol analysis
2016/5/5
Modern remote electronic voting systems, such as the prominent Helios
system, are designed to provide vote privacy and verifiability, where, roughly
speaking, the latter means that voters can make s...
We provide an overview of some of the security issues involved in securely implementing Lalley and Weyl's ``Quadratic Voting'', and suggest some possible implementation architectures. Our proposals bl...
TRVote: A New, Trustworthy and Robust Electronic Voting System
Electronic Voting DRE-Based Systems Security
2016/3/28
We propose a new Direct-Recording Electronic (DRE)-based voting system that we call TRVote. The reliability of TRVote is ensured during the vote generation phase where the random challenges are genera...
There have been intensive research efforts in the last two decades or so to design and deploy electronic voting (e-voting) protocols/systems which allow voters and/or external auditors to check that t...
In this report we describe our efforts in analysing log files produced by the Estonian i-voting system in the KOV2013, EP2014 and RK2015 elections in combination with other information available, so a...