2013
DOI: 10.1007/978-3-642-36830-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Practical Everlasting Privacy

Abstract: Abstract. Will my vote remain secret in 20 years? This is a natural question in the context of electronic voting, where encrypted votes may be published on a bulletin board for verifiability purposes, but the strength of the encryption is eroded with the passage of time. The question has been addressed through a property referred to as everlasting privacy. Perfect everlasting privacy may be difficult or even impossible to achieve, in particular in remote electronic elections. In this paper, we propose a defini… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(35 citation statements)
references
References 18 publications
(28 reference statements)
0
34
0
1
Order By: Relevance
“…In terms of modeling, symbolic techniques also have been recently proposed to model everlasting privacy [4].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In terms of modeling, symbolic techniques also have been recently proposed to model everlasting privacy [4].…”
Section: Related Workmentioning
confidence: 99%
“…The last two components of v are posted on P B and denoted d . 4. Proof of shuffle: The authorities compute two commitment consistent proofs of shuffle with respect to the committed permutation π: P v that shows that v is indeed a shuffle of v and P d that shows that d is a shuffle on d. P v is posted on SB and P d is posted on P B.…”
Section: Strippingmentioning
confidence: 99%
See 1 more Smart Citation
“…Some techniques and tools [7,8,9,10] for indistinguishability properties have recently been developed to automatically check indistinguishability properties and some of them can handle part of the primitives needed in e-voting. For example, ProVerif and Akiss have both been successfully applied to analyse some voting protocols [5,10,11,12,13,14]. However, a third source of difficulty is the fact that voting systems are typically parametrized by the number of voters: both the bulletin board and the tally processes have to process as many ballots as they receive.…”
Section: Introductionmentioning
confidence: 99%
“…SPEC [8], Akiss [10], and APTE [9]) can only handle a finite number of sessions. So case studies have to consider a finite number of voters [10,12,13,14] unless proofs are conducted by hand [13,15].…”
Section: Introductionmentioning
confidence: 99%