Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A practical secret voting scheme for large scale elections - MaRDI portal

A practical secret voting scheme for large scale elections

From MaRDI portal
Publication:4341689

DOI10.1007/3-540-57220-1_66zbMath1096.68612OpenAlexW1479744988MaRDI QIDQ4341689

Atsushi Fujioka, Kazuo Ohta, Tatsuaki Okamoto

Publication date: 14 January 1998

Published in: Advances in Cryptology — AUSCRYPT '92 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-57220-1_66



Related Items

A practical anonymous payment scheme for electronic commerce, A secure anonymous internet electronic voting scheme based on the polynomial, Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm, An efficient multi-receipt mechanism for uncoercible anonymous electronic voting, Electronic jury voting protocols, Provably secure randomized blind signature scheme based on bilinear pairing, Post-quantum online voting scheme, Privacy and verifiability in voting systems: methods, developments and trends, Protocol Verification Via Rigid/Flexible Resolution, On the (im)possibility of secure ElGamal blind signatures, A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling, \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist, The Abe-Okamoto partially blind signature scheme revisited, Cryptanalysis on Mu-Varadharajan's e-voting schemes, Deducibility constraints and blind signatures, Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols, Identity-based blind signature from lattices, On compositional reasoning about anonymity and privacy in epistemic logic, Invariants for parameterised Boolean equation systems, Computer science and decision theory, A Framework for Automatically Checking Anonymity with μCRL, Conditional Probabilities over Probabilistic and Nondeterministic Systems, Compositional Methods for Information-Hiding, Paths, tree homomorphisms and disequalities for -clauses, Automated Verification of Equivalence Properties of Cryptographic Protocols, A Proof Theoretic Analysis of Intruder Theories, An anonymous and flexible í-out-of-n electronic voting scheme, Round-optimal blind signatures in the plain model from classical and quantum standard assumptions, Unification Modulo Homomorphic Encryption, Digital Signatures, Efficient Round-Optimal Blind Signatures in the Standard Model, Cryptographic Voting — A Gentle Introduction, A new post-quantum voting protocol based on physical laws, The design of a secure and fair sealed-bid auction service, Privacy preserving electronic data gathering, Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model