Blockchain 3.0 applications survey
In this paper we survey a number of interesting applications of blockchain technology not
related to cryptocurrencies. As a matter of fact, after an initial period of application to …
related to cryptocurrencies. As a matter of fact, after an initial period of application to …
An overview of end-to-end verifiable voting systems
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …
The ballot is busted before the blockchain: A security analysis of voatz, the first internet voting application used in {US}. federal elections
In the 2018 midterm elections, West Virginia became the first state in the US to allow select
voters to cast their ballot on a mobile phone via a proprietary app called “Voatz.” Although …
voters to cast their ballot on a mobile phone via a proprietary app called “Voatz.” Although …
Blockchain 3.0 applications survey
D Di Francesco Maesa, P Mori - 2020 - dl.acm.org
In this paper we survey a number of interesting applications of blockchain technology not
related to cryptocurrencies. As a matter of fact, after an initial period of application to …
related to cryptocurrencies. As a matter of fact, after an initial period of application to …
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
S Zhang, L Wang, H Xiong - International Journal of Information Security, 2020 - Springer
Blockchain-enabled voting (BEV) systems have emerged as the next generation of modern
electronic voting (e-voting) systems, because the immutable property of the blockchain has …
electronic voting (e-voting) systems, because the immutable property of the blockchain has …
The New South Wales iVote system: Security failures and verification flaws in a live online election
JA Halderman, V Teague - E-Voting and Identity: 5th International …, 2015 - Springer
In the world's largest-ever deployment of online voting, the iVote Internet voting system was
trusted for the return of 280,000 ballots in the 2015 state election in New South Wales …
trusted for the return of 280,000 ballots in the 2015 state election in New South Wales …
Remote electronic voting in uncontrolled environments: A classifying survey
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …
for the last four decades. It is regularly discussed in public debates, especially in the context …
End-to-end verifiable elections in the standard model
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-
to-end verifiable in the standard model, ie, without any additional “setup” assumption or …
to-end verifiable in the standard model, ie, without any additional “setup” assumption or …
[图书][B] Real-world electronic voting: Design, analysis and deployment
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …
developments in electronic voting since 2003 in a real-world setting. It covers three broad …
Public evidence from secret ballots
M Bernhard, J Benaloh, J Alex Halderman… - … Joint Conference, E …, 2017 - Springer
Elections seem simple—aren't they just about counting? But they have a unique,
challenging combination of security and privacy requirements. The stakes are high; the …
challenging combination of security and privacy requirements. The stakes are high; the …