A secure and optimally efficient multi‐authority election scheme
R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …
privacy, universal veriability, and robustness. It is the first scheme for which the performance …
Multi-authority secret-ballot elections with linear work
R Cramer, M Franklin, B Schoenmakers… - … Conference on the Theory …, 1996 - Springer
We present new cryptographic protocols for multi-authority secret ballot elections that
guarantee privacy, robustness, and univer-sal verifiability. Application of some novel …
guarantee privacy, robustness, and univer-sal verifiability. Application of some novel …
[PDF][PDF] Distributing the power of a government to enhance the privacy of voters
JC Benaloh, M Yung - Proceedings of the fifth annual ACM symposium …, 1986 - dl.acm.org
In this paper, we distribute the functions of the government in the cryptographic election
scheme of [CoFi85]. In so doing, we are able to achieve privacy of individual votes in a much …
scheme of [CoFi85]. In so doing, we are able to achieve privacy of individual votes in a much …
An electronic voting scheme
T Okamoto - Advanced IT Tools: IFIP World Conference on IT Tools …, 1996 - Springer
This paper proposes a practical large scaled secret voting scheme which satisfies the
receipt-free property* as well as the fairness property†. This scheme uses three realistic …
receipt-free property* as well as the fairness property†. This scheme uses three realistic …
Practical multi-candidate election system
O Baudron, PA Fouque, D Pointcheval, J Stern… - Proceedings of the …, 2001 - dl.acm.org
The aim of electronic voting schemes is to provide a set of protocols that allow voters to cast
ballots while a group of authorities collect the votes and output the final tally. In this paper we …
ballots while a group of authorities collect the votes and output the final tally. In this paper we …
Efficient maximal privacy in boardroom voting and anonymous broadcast
J Groth - International Conference on Financial Cryptography, 2004 - Springer
Most voting schemes rely on a number of authorities. If too many of these authorities are
dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy …
dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy …
Receipt-free universally-verifiable voting with everlasting privacy
We present the first universally verifiable voting scheme that can be based on a general
assumption (existence of a non-interactive commitment scheme). Our scheme is also the first …
assumption (existence of a non-interactive commitment scheme). Our scheme is also the first …
A cryptographic scheme for computerized general elections
KR Iversen - Annual International Cryptology Conference, 1991 - Springer
This paper presents a novel cryptographic scheme which fully conforms to the requirements
of holding large scale general elections. The participants of the scheme are the voters, the …
of holding large scale general elections. The participants of the scheme are the voters, the …
An improvement on a practical secret voting scheme
M Mambo, Y Zheng, M Ohkubo, F Miura, M Abe… - … , ISW'99 Kuala Lumpur …, 1999 - Springer
This paper improves voters' convenience in the secret-ballot voting scheme offered by
Fujioka, Ohta and Okamoto. In their scheme, all voters have to participate in all stages of the …
Fujioka, Ohta and Okamoto. In their scheme, all voters have to participate in all stages of the …
Self-tallying elections and perfect ballot secrecy
Strong voter privacy, although an important property of an election scheme, is usually
compromised in election protocol design in favor of other (desirable) properties. In this work …
compromised in election protocol design in favor of other (desirable) properties. In this work …