搜索结果: 1-15 共查到“军队指挥学 electronic voting”相关记录17条 . 查询时间(0.077 秒)
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards
Block chains electronic voting bulletin boards
2018/7/18
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
electronic voting end-to-end verifiability coercion resistance
2018/3/5
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiability, everlasting privacy and efficient coercion resistance in the JCJ setting. Everlasting privacy is ...
Decryption phase in Norwegian electronic voting
electronic voting protocols verifiable shuffle
2016/12/8
We describe an efficient and secure decryption protocol to the
Norwegian Internet voting project. We first adapt Groth’s shuffledecryption
from 2010 to our purpose, and we prove all security
proper...
TRVote: A New, Trustworthy and Robust Electronic Voting System
Electronic Voting DRE-Based Systems Security
2016/3/28
We propose a new Direct-Recording Electronic (DRE)-based voting system that we call TRVote. The reliability of TRVote is ensured during the vote generation phase where the random challenges are genera...
E-voting protocols aim at achieving a wide range of sophisticated security
properties and, consequently, commonly employ advanced cryptographic
primitives. This makes their design as well as rigorou...
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
cryptographic protocols e-voting receipt-freeness
2015/12/29
We propose a new voting scheme, BeleniosRF, that offers both strong receipt-freeness
and end-to-end verifiability. It is strongly receipt-free in the sense that even dishonest voters
cannot prove ho...
This paper presents a novel unifying framework for electronic voting in
the universal composability model that includes a property which is new to universal
composability but well-known to voting sy...
Electronic voting systems are among the most security critical distributed systems. Different trust concepts are implemented to mitigate the risk of conspiracies endangering security properties. These...
Abstract: We present a paper-based voting method that attempts to achieve the privacy of voters and election universal verifiability and integrity with only paper ballots and without using any cryptog...
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
cryptographic protocol delegation of computation verifiable electronic voting
2013/2/21
This paper presents some proposals of protocols for two types of schemes such as verifiable delegation of computation and remote electronic voting, based on polynomial properties. Our protocols for ve...
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Electronic Voting DRE internet voting
2010/8/26
The Direct Recording Electronic (DRE) system commonly uses touch-screen technology to directly record votes. It can provide several benefits in large-scale electronic voting, including usability, acce...
Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting
Anonymity of voter Unforgeability of ticket Perceptibility of double voting
2009/9/11
Mu and Varadharajan proposed an electronic voting scheme and claimed
that their scheme authenticate the voters, protect the anonymity of them,
and detect the identity of double voters. Due to some w...
Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting
Anonymity of voter Unforgeability of ticket Perceptibility of double voting
2009/9/2
Mu and Varadharajan proposed an electronic voting scheme and claimed
that their scheme authenticate the voters, protect the anonymity of them,
and detect the identity of double voters. Due to some w...
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
Electronic voting Anonymity of voter Unforgeability of ticket
2009/9/2
Mu et al. proposed an electronic voting protocol and claimed that it protects
voter's anonymity, detects double voting and authenticates eligible voters. It
has been shown that it does not protect v...
Relay Attacks on RFID-Based Electronic Voting Systems
Relay Attacks RFID-Based Electronic Voting Systems
2009/9/2
Many secure systems, such as contactless credit cards and
secure entrance systems, are built with contactless smartcard RFID tech-
nologies. In many cases these systems are claimed to be secure base...