A review of contemporary e-voting: Requirements, technology, systems and usability

KHK Wang, SK Mondal, KC Chan… - Data Science and Pattern …, 2017 - repository.ust.hk
E-voting technology has been developed for more than 30 years. However it is still distance
away from serious application. The major challenges are to provide a secure solution and to …

An overview of end-to-end verifiable voting systems

ST Ali, J Murray - Real-World Electronic Voting, 2016 - taylorfrancis.com
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.

D Chaum, R Carback, J Clark, A Essex, S Popoveniuc… - EVT, 2008 - usenix.org
We introduce Scantegrity II, a practical enhancement for optical scan voting systems that
achieves increased election integrity through the novel use of confirmation codes printed on …

[图书][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016 - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …

[PDF][PDF] Scantegrity {II} Municipal Election at Takoma Park: The First {E2E} Binding Governmental Election with Ballot Privacy

R Carback, D Chaum, J Clark, J Conway… - 19th USENIX Security …, 2010 - usenix.org
Abstract On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for the mayor
and city council members using the Scantegrity II voting system—the first time any end-to …

Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes

D Chaum, RT Carback, J Clark, A Essex… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Scantegrity II is an enhancement for existing paper ballot systems. It allows voters to verify
election integrity-from their selections on the ballot all the way to the final tally-by noting …

Secure and anonymous voting D-app with IoT embedded device using blockchain technology

C Toma, M Popa, C Boja, C Ciurea, M Doinea - Electronics, 2022 - mdpi.com
The paper presents the construction of a proof-of-concept for a distributed and decentralized
e-voting application in an IoT embedded device with the help of blockchain technology. A …

Privacy and verifiability in voting systems: Methods, developments and trends

H Jonker, S Mauw, J Pang - Computer Science Review, 2013 - Elsevier
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …

A random zoo: sloth, unicorn, and trx

AK Lenstra, B Wesolowski - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Many applications require trustworthy generation of public random numbers. It is shown how
this can be achieved using a hash function that is timed to be as slow as desired (sloth) …

Trustworthy public randomness with sloth, unicorn, and trx

AK Lenstra, B Wesolowski - International Journal of Applied …, 2017 - inderscienceonline.com
Many applications require trustworthy generation of public random numbers. It is shown how
this can be achieved using a hash function that is timed to be as slow as desired (sloth) …