2016
DOI: 10.1007/978-3-662-53357-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Coercion-Resistant Internet Voting with Everlasting Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…To the best of our knowledge, current filtering schemes that offer a trustless deniable voting scheme which, at the same time have public verifiability, are the ones proposed by Achenbach et al [26], Locher et al [27], Locher et al [28] and Lueks et al [29]. The first three use similar solutions.…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, current filtering schemes that offer a trustless deniable voting scheme which, at the same time have public verifiability, are the ones proposed by Achenbach et al [26], Locher et al [27], Locher et al [28] and Lueks et al [29]. The first three use similar solutions.…”
Section: Related Workmentioning
confidence: 99%
“…E-voting protocols typically utilize the following cryptographic techniques: mix-net [1,3,14,16,18,19,22,29,41,45,56,57,63,66], homomorphic encryption [2,4,25,27,28,40,43,47], blind signature [12,17,44,51,54] and secret sharing based on polynomials [6,7,27,59] or simple (n, n) secret sharing [68]. Despite numerous previous work on everlasting voting privacy [10,11,27,32,33,[46][47][48][49][50]64], we note that the adversary models under which these schemes can achieve privacy could be different. For example, some systems require complex and contrasting assumptions in order to deliver privacy protections [5,29].…”
Section: Related Workmentioning
confidence: 99%
“…The KTV-Helios scheme ensures probabilistic receipt-freeness via deniable vote updating. The principle of deniable vote updating has also been proposed in other e-voting schemes [24][25][26] in order to prevent a voter from constructing receipts that show how the voter has voted. As such, the voter can cast her vote for the voting option the adversary instructs to vote for, but due to deniable vote updating the voter can change her vote without the adversary knowing it.…”
Section: Receipt-freenessmentioning
confidence: 99%