Adapting Helios for provable ballot privacy
Recent results show that the current implementation of Helios, a practical e-voting protocol,
does not ensure independence of the cast votes, and demonstrate the impact of this lack of …
does not ensure independence of the cast votes, and demonstrate the impact of this lack of …
Election verifiability or ballot privacy: Do we need to choose?
We propose a new encryption primitive, commitment consistent encryption (CCE), and
instances of this primitive that enable building the first universally verifiable voting schemes …
instances of this primitive that enable building the first universally verifiable voting schemes …
Some remarks on a receipt-free and universally verifiable mix-type voting scheme
M Michels, P Horster - International Conference on the Theory and …, 1996 - Springer
Abstract At Eurocrypt'95 Sako and Kilian presented the first Mix-type voting scheme which is
receipt-free and universally verifiable. In this contribution we analyze this scheme and show …
receipt-free and universally verifiable. In this contribution we analyze this scheme and show …
Three voting protocols: ThreeBallot, VAV, and Twin
RL Rivest, WD Smith - USENIX/ACCURATE Electronic Voting …, 2007 - usenix.org
We present three new paper-based voting methods with interesting security properties. Our
goal is to achieve the same security properties as recently proposed cryptographic voting …
goal is to achieve the same security properties as recently proposed cryptographic voting …
[PDF][PDF] Receipt-free secret-ballot elections
J Benaloh, D Tuinstra - Proceedings of the twenty-sixth annual ACM …, 1994 - dl.acm.org
Prior verifiable secret-ballot election protocols all suffer from a common defect whkhrenderst
hemunsuitablef orpracticalu se: they allow voters to (if they wish) carry away from the …
hemunsuitablef orpracticalu se: they allow voters to (if they wish) carry away from the …
The threeballot voting system
RL Rivest - 2006 - dspace.mit.edu
We present a new paper-based voting method with interesting security properties. The
attempt here is to see if one can achieve the same security properties of recently proposed …
attempt here is to see if one can achieve the same security properties of recently proposed …
[PDF][PDF] Cryptographic Voting Protocols: A Systems Perspective.
Cryptographic voting protocols offer the promise of verifiable voting without needing to trust
the integrity of any software in the system. However, these cryptographic protocols are only …
the integrity of any software in the system. However, these cryptographic protocols are only …
The vector-ballot e-voting approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic
design paradigms (or approaches):(a) Mix-Networks based,(b) Homomorphic Encryption …
design paradigms (or approaches):(a) Mix-Networks based,(b) Homomorphic Encryption …
Prêt à voter with re-encryption mixes
PYA Ryan, SA Schneider - … 2006: 11th European Symposium on Research …, 2006 - Springer
We present a number of enhancements to the voter verifiable election scheme Prêt à Voter
[CRS05]. Firstly, we propose a mechanism for the distributed construction by a set of …
[CRS05]. Firstly, we propose a mechanism for the distributed construction by a set of …
Scratch & vote: self-contained paper-based cryptographic voting
We present Scratch & Vote;(S&V), a cryptographic voting system designed to minimize cost
and complexity:(1) ballots are paper-based and can be printed using today's technology,(2) …
and complexity:(1) ballots are paper-based and can be printed using today's technology,(2) …