A review of contemporary e-voting: Requirements, technology, systems and usability
E-voting technology has been developed for more than 30 years. However it is still distance
away from serious application. The major challenges are to provide a secure solution and to …
away from serious application. The major challenges are to provide a secure solution and to …
An overview of end-to-end verifiable voting systems
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
We introduce Scantegrity II, a practical enhancement for optical scan voting systems that
achieves increased election integrity through the novel use of confirmation codes printed on …
achieves increased election integrity through the novel use of confirmation codes printed on …
[图书][B] Real-world electronic voting: Design, analysis and deployment
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …
developments in electronic voting since 2003 in a real-world setting. It covers three broad …
[PDF][PDF] Scantegrity {II} Municipal Election at Takoma Park: The First {E2E} Binding Governmental Election with Ballot Privacy
Abstract On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for the mayor
and city council members using the Scantegrity II voting system—the first time any end-to …
and city council members using the Scantegrity II voting system—the first time any end-to …
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
Scantegrity II is an enhancement for existing paper ballot systems. It allows voters to verify
election integrity-from their selections on the ballot all the way to the final tally-by noting …
election integrity-from their selections on the ballot all the way to the final tally-by noting …
Secure and anonymous voting D-app with IoT embedded device using blockchain technology
The paper presents the construction of a proof-of-concept for a distributed and decentralized
e-voting application in an IoT embedded device with the help of blockchain technology. A …
e-voting application in an IoT embedded device with the help of blockchain technology. A …
Privacy and verifiability in voting systems: Methods, developments and trends
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …
A random zoo: sloth, unicorn, and trx
AK Lenstra, B Wesolowski - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Many applications require trustworthy generation of public random numbers. It is shown how
this can be achieved using a hash function that is timed to be as slow as desired (sloth) …
this can be achieved using a hash function that is timed to be as slow as desired (sloth) …
Trustworthy public randomness with sloth, unicorn, and trx
AK Lenstra, B Wesolowski - International Journal of Applied …, 2017 - inderscienceonline.com
Many applications require trustworthy generation of public random numbers. It is shown how
this can be achieved using a hash function that is timed to be as slow as desired (sloth) …
this can be achieved using a hash function that is timed to be as slow as desired (sloth) …