1997
DOI: 10.1002/ett.4460080506
|View full text |Cite
|
Sign up to set email alerts
|

A secure and optimally efficient multi‐authority election scheme

Abstract: Abstract. In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the scheme is that the time and communication complexity for the voter is independent of the number of authorities. A voter simply posts a single encrypted mess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
253
0
3

Year Published

2000
2000
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 370 publications
(257 citation statements)
references
References 28 publications
1
253
0
3
Order By: Relevance
“…On the other hand, schemes using mix-nets [1, 9-12, 14, 19, 22] and/or homomorphic encryption [3,6,7] may provide it.…”
Section: Universal Verifiability Of the Tallymentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, schemes using mix-nets [1, 9-12, 14, 19, 22] and/or homomorphic encryption [3,6,7] may provide it.…”
Section: Universal Verifiability Of the Tallymentioning
confidence: 99%
“…In voting schemes based on homomorphic encryption [3,6,7] privacy relies on computational assumptions, and is thus not unconditional. When mix-nets are used, this is the same, since the latter applies on asymmetric encryptions of the votes.…”
Section: Unconditional Privacymentioning
confidence: 99%
“…In order to decrypt a ciphertext, a minimal number of t out n parties is necessary. See Cramer et al [9] for a description of an El Gamal threshold cryptosystem and Gennaro et al [13] for a secure key generation protocol.…”
Section: Building Blocksmentioning
confidence: 99%
“…There are techniques to verify that the ballot is well formed but they are outside the scope of this paper (e.g. Neff in [5] suggests the use of techniques presented in [15,16]). …”
Section: Special Bit Encoding and Encryption -mentioning
confidence: 99%
“…Public Bulletin Board -To enable public verification of the election's integrity all non private data should be public, for which we use the usual public bulletin board construction [13,16]. All data in the bulletin board is authenticated by means of digital signatures.…”
Section: Protocol Building Blocksmentioning
confidence: 99%