The security reference architecture for blockchains: Toward a standardized model for studying vulnerabilities, threats, and defenses

I Homoliak, S Venugopalan… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Blockchains are distributed systems, in which security is a critical factor for their success.
However, despite their increasing popularity and adoption, there is a lack of standardized …

A smart contract for boardroom voting with maximum voter privacy

P McCorry, SF Shahandashti, F Hao - … , FC 2017, Sliema, Malta, April 3-7 …, 2017 - Springer
We present the first implementation of a decentralised and self-tallying internet voting
protocol with maximum voter privacy using the Blockchain. The Open Vote Network is …

Research on a covert communication model realized by using smart contracts in blockchain environment

L Zhang, Z Zhang, W Wang, Z Jin, Y Su… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The traditional covert communication channel relying on a third-party node is vulnerable to
attack. The data are easily tampered with and the identity information of the communication …

An overview of end-to-end verifiable voting systems

ST Ali, J Murray - Real-World Electronic Voting, 2016 - taylorfrancis.com
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …

A blockchain-based self-tallying voting protocol in decentralized IoT

Y Li, W Susilo, G Yang, Y Yu, D Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is experiencing explosive growth and has gained extensive
attention from academia and industry in recent years. However, most of the existing IoT …

Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model

B Libert, KG Paterson, EA Quaglia - … Conference on Practice and Theory in …, 2012 - Springer
In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue
has received very little attention so far and all but one of the currently available BE schemes …

Anonymous voting by two-round public discussion

F Hao, PYA Ryan, P Zieliński - IET Information Security, 2010 - IET
In 2006, Hao and Zieliński proposed a two-round anonymous veto protocol (called AV-net),
which provided exceptional efficiency compared to related techniques. In this study, the …

PriScore: Blockchain-based self-tallying election system supporting score voting

Y Yang, Z Guan, Z Wan, J Weng… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Election and voting play crucial roles in democratic society for an elactorate to make a
collective decision. E-voting is one of the most challenging problems in cryptographic …

[图书][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016 - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …

A smart contract system for decentralized borda count voting

S Panja, S Bag, F Hao, B Roy - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, we propose the first self-tallying decentralized e-voting protocol for a ranked-
choice voting system based on Borda count. Our protocol does not need any trusted setup or …