A secure and optimally efficient multi‐authority election scheme

R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …

Multi-authority secret-ballot elections with linear work

R Cramer, M Franklin, B Schoenmakers… - … Conference on the Theory …, 1996 - Springer
We present new cryptographic protocols for multi-authority secret ballot elections that
guarantee privacy, robustness, and univer-sal verifiability. Application of some novel …

[PDF][PDF] Distributing the power of a government to enhance the privacy of voters

JC Benaloh, M Yung - Proceedings of the fifth annual ACM symposium …, 1986 - dl.acm.org
In this paper, we distribute the functions of the government in the cryptographic election
scheme of [CoFi85]. In so doing, we are able to achieve privacy of individual votes in a much …

An electronic voting scheme

T Okamoto - Advanced IT Tools: IFIP World Conference on IT Tools …, 1996 - Springer
This paper proposes a practical large scaled secret voting scheme which satisfies the
receipt-free property* as well as the fairness property†. This scheme uses three realistic …

Practical multi-candidate election system

O Baudron, PA Fouque, D Pointcheval, J Stern… - Proceedings of the …, 2001 - dl.acm.org
The aim of electronic voting schemes is to provide a set of protocols that allow voters to cast
ballots while a group of authorities collect the votes and output the final tally. In this paper we …

Efficient maximal privacy in boardroom voting and anonymous broadcast

J Groth - International Conference on Financial Cryptography, 2004 - Springer
Most voting schemes rely on a number of authorities. If too many of these authorities are
dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy …

Receipt-free universally-verifiable voting with everlasting privacy

T Moran, M Naor - Advances in Cryptology-CRYPTO 2006: 26th Annual …, 2006 - Springer
We present the first universally verifiable voting scheme that can be based on a general
assumption (existence of a non-interactive commitment scheme). Our scheme is also the first …

A cryptographic scheme for computerized general elections

KR Iversen - Annual International Cryptology Conference, 1991 - Springer
This paper presents a novel cryptographic scheme which fully conforms to the requirements
of holding large scale general elections. The participants of the scheme are the voters, the …

An improvement on a practical secret voting scheme

M Mambo, Y Zheng, M Ohkubo, F Miura, M Abe… - … , ISW'99 Kuala Lumpur …, 1999 - Springer
This paper improves voters' convenience in the secret-ballot voting scheme offered by
Fujioka, Ohta and Okamoto. In their scheme, all voters have to participate in all stages of the …

Self-tallying elections and perfect ballot secrecy

A Kiayias, M Yung - International Workshop on Public Key Cryptography, 2002 - Springer
Strong voter privacy, although an important property of an election scheme, is usually
compromised in election protocol design in favor of other (desirable) properties. In this work …