The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.108
|View full text |Cite
|
Sign up to set email alerts
|

On Coercion-Resistant Electronic Elections with Linear Work

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…Moreover, it includes a timestamp in the tuple that the voter submits and a further mix step in the tallying phase. The latter improvements, though, are irrelevant as pointed out by Weber et al [26].…”
Section: Smith's Comparison Mechanismmentioning
confidence: 87%
See 1 more Smart Citation
“…Moreover, it includes a timestamp in the tuple that the voter submits and a further mix step in the tallying phase. The latter improvements, though, are irrelevant as pointed out by Weber et al [26].…”
Section: Smith's Comparison Mechanismmentioning
confidence: 87%
“…Also, it corrects some problems observed by Smith in JCJ scheme. Weber et al [26], however, pointed out problems of Smith's proposal and presented a protocol that combines the ideas of JCJ with a variant of Smith's mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…In our work, we follow the scheme of many previous protocols using homomorphic encryption to ensure universal verifiability and unlinkability of ballots [1,7,8,11,28,16], which naturally lends itself to threshold cryptography, affording us a greater level of assurance against corrupted talliers. These protocols, along with some of those already mentioned, require, for remote voting, that the voter is not observed at the "very moment of voting" [18].…”
Section: Related Workmentioning
confidence: 99%
“…Many electronic voting protocols [24,10,16,9,28] rely on anonymous channels, or anonymous and untappable channels [19], to satisfy some security properties. When considering voting over the Internet (an inherently insecure medium), one needs to think about how an anonymous channel could be implemented in the first place.…”
Section: Related Workmentioning
confidence: 99%
“…(This interpretation is compatible with our definition of coercion-resistance provided in Section 3.) After the scheme was published, several proposals for improvements followed [24,27,3], of which only the last one succeeds in maintaining coercion-resistance. However, as the improvements in [3] only pertain to efficiency, they are not relevant to our approach.…”
Section: Anonymous Credentials: Juels Et Almentioning
confidence: 99%