搜索结果: 31-45 共查到“军事学 Voting”相关记录77条 . 查询时间(0.257 秒)
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Cast-as-intended e-voting Estonian e-voting secure hardware
2016/1/9
We propose a simple cast-as-intended remote e-voting protocol where the security is
based on the use of secure (and trusted) smart cards that incorporate incard numeric keyboards
and LCD displays, a...
Secret and Verifiable Delegated Voting for Wide Representation
cryptographic voting elections maximum entropy
2016/1/9
This paper combines cryptographic voting and web page ranking
and proves that it is possible to hold elections so as not to limit a voter by a list
of candidates, to benefit from voter’s personal ex...
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
Paper ballot Paper PUF Voting Integrity
2016/1/6
Abstract—Voting systems based on paper ballots has a long history with various problems. Vote-selling and correct outcome are two major problems among many. In this work, we propose a new solution to ...
E-voting protocols aim at achieving a wide range of sophisticated security
properties and, consequently, commonly employ advanced cryptographic
primitives. This makes their design as well as rigorou...
The Norwegian Internet Voting Protocol: A new Instantiation
electronic voting protocols Decision Diffie-Hellman zero-knowledge
2015/12/30
The Norwegian government ran trials of internet remote voting during the 2011
municipal elections and the 2013 parliamentary elections. From a simplified version
of the voting protocol used there, t...
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
applications electronic voting
2015/12/29
Efficiency is the bottleneck of many cryptographic protocols
towards their practical application in different contexts. This holds true
also in the context of electronic voting, where cryptographic ...
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
cryptographic protocols e-voting receipt-freeness
2015/12/29
We propose a new voting scheme, BeleniosRF, that offers both strong receipt-freeness
and end-to-end verifiability. It is strongly receipt-free in the sense that even dishonest voters
cannot prove ho...
This paper presents a novel unifying framework for electronic voting in
the universal composability model that includes a property which is new to universal
composability but well-known to voting sy...
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
applications Election Schemes
2015/12/21
End-to-end verifiable voting schemes typically involves voters
handling an encrypted ballot in order to confirm that their vote is
accurately included in the tally. While this may be technically val...
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
e-voting bilinear maps secure computation
2015/12/21
In 2010 Hao, Ryan and Zielinski proposed a simple decentralized evoting
protocol that only requires 2 rounds of communication. Thus, for k elections
their protocol needs 2k rounds of communication.
The Norwegian government ran a trial of internet remote voting during the 2011 local government elections, and will run another trial during the 2013 parliamentary elections. A new cryptographic votin...
Electronic voting systems are among the most security critical distributed systems. Different trust concepts are implemented to mitigate the risk of conspiracies endangering security properties. These...
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. On the one hand, privacy requires that a vote canno...
Abstract: We present a paper-based voting method that attempts to achieve the privacy of voters and election universal verifiability and integrity with only paper ballots and without using any cryptog...
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
Malleable Proofs Distributed Key Generation
2014/3/13
Mixnets are one of the main approaches to deploy secret and verifiable electronic elections. General-purpose verifiable mixnets however suffer from the drawback that the amount of data to be verified ...