Privacy and verifiability in voting systems: methods, developments and trends
From MaRDI portal
Publication:395657
DOI10.1016/J.COSREV.2013.08.002zbMath1279.68073OpenAlexW1991061563MaRDI QIDQ395657
Sjouke Mauw, Hugo Jonker, Jun Pang
Publication date: 29 January 2014
Published in: Computer Science Review (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cosrev.2013.08.002
Voting theory (91B12) Data encryption (aspects in computer science) (68P25) Research exposition (monographs, survey articles) pertaining to computer science (68-02)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Practical multi-candidate election system
- Receipt-free secret-ballot elections (extended abstract)
- Multi-Authority Secret-Ballot Elections with Linear Work
- Designated Verifier Proofs and Their Applications
- Vote-Independence: A Powerful Privacy Notion for Voting Protocols
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling
- Benaloh’s Dense Probabilistic Encryption Revisited
- How to share a secret
- A formal framework for quantifying voter-controlled privacy
- Formalising Receipt-Freeness
- On Some Incompatible Properties of Voting Schemes
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- On the security of public key protocols
- A method for obtaining digital signatures and public-key cryptosystems
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- A practical secret voting scheme for large scale elections
- Nonmalleable Cryptography
- Fully homomorphic encryption using ideal lattices
- Programming Languages and Systems
- Selected Areas in Cryptography
- Information Security and Cryptology - ICISC 2003
- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
This page was built for publication: Privacy and verifiability in voting systems: methods, developments and trends