Blinded additively homomorphic encryption schemes for self-tallying voting

Journal of Information Security and Applications - Tập 22 - Trang 40-53 - 2015
Jérôme Dossogne1, Frédéric Lafitte2
1Département d’Informatique, Université Libre de Bruxelles, Brussels, Belgium
2Department of Mathematics, Royal Military Academy, Brussels, Belgium

Tài liệu tham khảo

Adida, 2008, Helios: web-based open-audit voting, 335 Adida, 2009, Electing a University President using Open-Audit Voting (SlideShow), 10 Adida, 2010, State of Helios 2010 : features and deployments Anderson, 1996, Tamper resistance: a cautionary note, vol. 2, 1 Backes, 2008, Zero-knowledge in the applied Pi-calculus and automated verification of the direct anonymous attestation protocol, 202 Brandi, 2006, On bidder zones, cell phones and ballot stuffing, 1 Brandi, 2008, Preservation of privacy in thwarting the ballot stuffing scheme, vol. 5185, 195 Burnand, 2010 Castagnos, 2007, Towards a DL-based additively homomorphic encryption scheme, vol. 4779, 362 Chaum, 1988, The dining cryptographers problem: unconditional sender and recipient untraceability, J. Cryptol, 1, 65, 10.1007/BF00206326 Clark, 2011 Clarkson, 2008, Civitas : toward a secure voting system, 7875, 354 Cortier, 2011, Attacking and fixing Helios: an analysis of ballot secrecy, 297 Cortier, 2011, Ballot stuffing in a postal voting system, 27 Cortier, 2010 Dossogne, 2011, Mental voting booths, 82 Dossogne, 2012, Coercion-Freeness in e-voting via Multi-party Designated Verifier Schemes, 127 Dossogne, 2009, Voting with a tripartite designated verifier scheme based on threshold RSA signatures, vol. 1, 113 Dossogne, 2010, Online banking and man in the browser attacks, survey of the belgian situation, 19 Dossogne, 2011, Enhancing cryptographic code against side channel cryptanalysis with aspects, 39 El Gamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, 469 Gonzalez, 2012 Groth, 2004, Efficient maximal privacy in Boardroom voting and anonymous broadcast, vol. 3110, 90 Heiberg, 2010, On E-vote Integrity in the case of malicious voter computers, vol. 6345, 373 Juels, 2005, Coercion-resistant electronic elections, 61 Kiayias, 2002, Self-tallying elections and perfect ballot secrecy, vol. 2274, 141 Kramer, 2011, A modular multi-modal specification of real-timed, End-To-End voter-verifiable voting systems Laguillaumie, 2007, Multi-designated verifiers signatures: anonymity without encryption, Information Processing Letters, 102, 127, 10.1016/j.ipl.2006.08.015 Lenstra, 1990, Algorithms in number theory, vol. A, 673 Li, 2012, Boardroom voting scheme with unconditionally secret ballots based on DC-Net, vol. 7645, 220 Neumann, 2013, Towards a practical JCJ/civitas implementation, vol. 220, 804 Neumann, 2012, Civitas and the real world: problems and solutions from a practical point of view, 180 Olembo, 2012, Partial verifiability in POLYAS for the GI Elections, vol. 205, 95 Olio, 2004, Voting with designated verifier signature-like protocol, 295 Paillier, 1999, Public-key cryptosystems based on composite degree residuosity classes, vol. 1592, 223 Rfi.fr, 2012 Ryan, 2006 Sampigethaya, 2006, A framework and taxonomy for comparison of electronic voting schemes, Computers & Security, 25, 137, 10.1016/j.cose.2005.11.003 Sensei Enterprises, I, 2004 Shirazi, 2011, Robust electronic voting: introducing robustness in Civitas, 47 Shoup, 1997, Lower Bounds for discrete logarithms and related problems, vol. 1233, 256 Vabariigi Valimiskomisjon, 2011 Weber, 2011 Yi, 2011, Practical remote end-to-end voting scheme, vol. 6866, 386