Javascript must be enabled to continue!
Strong Privacy Protection in Electronic Voting
View through CrossRef
We give suggestions for protection against adversaries with access to the voter's equipment in voting schemes based on homomorphic encryption. Assuming an adversary has complete knowledge of the contents and computations taking place on the client machine we protect the voter's privacy in a way so that the adversary has no knowledge about the voter's choice. Furthermore, an active adversary trying to change a voter's ballot may do so, but will end up voting for a random candidate. <br /> <br />To accomplish the goal we assume that the voter has access to a secondary communication channel through which he can receive information inaccessible to the adversary. An example of such a secondary communication channel is ordinary mail. Additionally, we assume the existence of a trusted party that will assist in the protocol. To some extent, the actions of this trusted party are verifiable.
Title: Strong Privacy Protection in Electronic Voting
Description:
We give suggestions for protection against adversaries with access to the voter's equipment in voting schemes based on homomorphic encryption.
Assuming an adversary has complete knowledge of the contents and computations taking place on the client machine we protect the voter's privacy in a way so that the adversary has no knowledge about the voter's choice.
Furthermore, an active adversary trying to change a voter's ballot may do so, but will end up voting for a random candidate.
<br /> <br />To accomplish the goal we assume that the voter has access to a secondary communication channel through which he can receive information inaccessible to the adversary.
An example of such a secondary communication channel is ordinary mail.
Additionally, we assume the existence of a trusted party that will assist in the protocol.
To some extent, the actions of this trusted party are verifiable.
Related Results
Analysis and Design of Work Systems using Hazard Analysis and Critical Control Points (HACCP) Standards at Mr. Sarbani’s Tempe Jombor Sukoharjo
Analysis and Design of Work Systems using Hazard Analysis and Critical Control Points (HACCP) Standards at Mr. Sarbani’s Tempe Jombor Sukoharjo
<p><strong>MSMEs </strong><strong>have very </strong><strong>large</strong><strong> number of actors so </strong><strong>...
Electronic Voting Systems
Electronic Voting Systems
In 2001, Wand and colleagues published a paper titled “The Butterfly Did It” (see Wand, et al. 2001, cited under Voting System Neutrality) in which they argue that Palm Beach Count...
Makna Puisi Kotoba (言葉) Karya Tanikawa Shuntaro: Analisis Semiotika Riffa Terre
Makna Puisi Kotoba (言葉) Karya Tanikawa Shuntaro: Analisis Semiotika Riffa Terre
<p><em>Abstrak</em> - <strong>Penelitian ini bertujuan untuk untuk menemukan makna dalam puisi <em>Kotoba</em> karya Tanikawa Shuntaro.</stro...
Motivasi Berjilbab Mahasiswi Universitas Al Azhar Indonesia (UAI)
Motivasi Berjilbab Mahasiswi Universitas Al Azhar Indonesia (UAI)
<p><em>Abstrak – </em><strong>Titik tolak penelitian ini adalah untuk menelusuri secara ilmiah motivasi berjilbab mahasiswi UAI –khususnya mereka yang berji...
Exploratory Review: Decentralized Voting System Using Blockchain
Exploratory Review: Decentralized Voting System Using Blockchain
Abstract: Electronic voting, often known as e-voting, has been utilized in various forms since the 1970s, with basic advantages over paper-based systems such as improved efficiency...
Rancangan Service Scorecard sebagai Pengukuran Kinerja Pelayanan Cargo
Rancangan Service Scorecard sebagai Pengukuran Kinerja Pelayanan Cargo
<p><em>Abstrak<strong> – </strong></em><strong>Persaingan antara pelaku bisnis </strong><strong><em>charter flight</em>&...
SoK: Secure E-Voting with Everlasting Privacy
SoK: Secure E-Voting with Everlasting Privacy
Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...

