搜索结果: 61-75 共查到“军事学 Voting”相关记录77条 . 查询时间(0.07 秒)
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
Electronic voting Anonymity of voter Unforgeability of ticket
2009/9/2
Mu et al. proposed an electronic voting protocol and claimed that it protects
voter's anonymity, detects double voting and authenticates eligible voters. It
has been shown that it does not protect v...
Relay Attacks on RFID-Based Electronic Voting Systems
Relay Attacks RFID-Based Electronic Voting Systems
2009/9/2
Many secure systems, such as contactless credit cards and
secure entrance systems, are built with contactless smartcard RFID tech-
nologies. In many cases these systems are claimed to be secure base...
We present Scratch, Click & Vote remote voting scheme. The scheme
is end-to-end verifiable and allows for voting over the Internet. It guarantees security
against malicious hardware and software use...
Information-Theoretically Secure Voting Without an Honest Majority
multiparty computation election protocol dining cryptographers
2009/6/5
We present three voting protocols with unconditional privacy
and information-theoretic correctness, without assuming any bound on
the number of corrupt voters or voting authorities. All protocols ha...
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
Farnel Threeballot Randell-Ryan Voting Schemes
2009/6/3
A number of recent voting schemes provide the property of voter verifiability:
voters can confirm that their votes are accurately counted in the
tally. The Farnel type voting schemes are based on th...
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
mix network mix net shuffle network
2009/4/13
We propose a new technique for making mix nets
robust, called randomized partial checking (RPC).
The basic idea is that rather than providing a proof
of completely correct operation, each server pr...
Evaluating Security of Voting Schemes in the Universal Composability Framework
Voting homomorphic threshold encryption universal composability
2009/4/13
In the literature, voting protocols are considered secure if they satisfy requirements
such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting
protocol with respect...
Electronic voting is a prime application of cryptographic tools.
Many researches are addressing election or confidence voting in this
area. We address a new type of voting scheme “Divisible Voting
...
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
e-voting privacy ElGamal encryption system homomorphic encryption
2009/4/3
In this paper, we focus on the design of the winner-determination procedure of
an electronic voting protocol used at critical elections, e.g. at the meeting of the board
of a company for critical bu...
Short Linkable Ring Signatures for E-voting,E-cash and Attestation
Short Linkable Ring Signatures E-voting,E-cash Attestation
2009/4/1
A ring signature scheme can be viewed as a group signa-
ture scheme with no anonymity revocation and with simple group setup.
A linkable ring signature (LRS) scheme additionally allows anyone to
de...
An e-Voting Scheme with Improved Resistance to Bribe and Coercion
e-voting scheme receipt-freeness uncoercibility
2009/3/31
Bribe and coercion are common in conventional voting systems and usually will lead to a biased result that imparts the desired democracy. However, these problems become more difficult to solve when us...
Probabilistic Opacity for a Passive Adversary and its Application to Chaum’s Voting Scheme
Opacity Non-Interference Chaum’s Voting Scheme
2009/1/22
A predicate is opaque for a given system, if an adversary will never be able
to establish truth or falsehood of the predicate for any observed computation. This notion
has been essentially introduce...
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
electronic voting bilinear pairings ID-based cryptographic system
2008/12/22
In 1997, Cranor and Cytron proposed an electronic voting protocol, Sensus
protocol, intended to be applied in a real election. However, in 2005 Fabrizio et.al.
pointed out there is a vulnerability e...
Towards Trustworthy e-Voting using Paper Receipts
e-voting voter verifiable e-voting paper receipts
2008/11/20
Current electronic voting systems are not sufficient to satisfy
trustworthy elections as they do not provide any proofs or confirming
evidences of their honesty. This lack of trustworthiness is the ...
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
secure electronic voting coercion-free receipt-free
2008/9/1
It is debatable if current direct-recording electronic voting
machines can sufficiently be trusted for a use in elections. Reports about
malfunctions and possible ways of manipulation abound. Voting...