Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing 2001
DOI: 10.1145/383962.384044
|View full text |Cite
|
Sign up to set email alerts
|

Practical multi-candidate election system

Abstract: International audienceThe aim of electronic voting schemes is to provide a set of protocols that allow voters to cast ballots while a group of authorities collect the votes and output the final tally. In this paper we describe a practical multi-candidate election scheme that guarantees privacy of voters, public verifiablity and robustness against a coalition of malicious authorities. Furthermore, we address the problem of receipt-freeness and incoercibility of voters. Our new scheme is based on the Paillier cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
240
0
4

Year Published

2001
2001
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 220 publications
(245 citation statements)
references
References 34 publications
1
240
0
4
Order By: Relevance
“…On the other hand, schemes using mix-nets [1, 9-12, 14, 19, 22] and/or homomorphic encryption [3,6,7] may provide it.…”
Section: Universal Verifiability Of the Tallymentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, schemes using mix-nets [1, 9-12, 14, 19, 22] and/or homomorphic encryption [3,6,7] may provide it.…”
Section: Universal Verifiability Of the Tallymentioning
confidence: 99%
“…In voting schemes based on homomorphic encryption [3,6,7] privacy relies on computational assumptions, and is thus not unconditional. When mix-nets are used, this is the same, since the latter applies on asymmetric encryptions of the votes.…”
Section: Unconditional Privacymentioning
confidence: 99%
“…These homomorphic properties make this encryption scheme suitable for different applications such as secure voting and lottery protocols [3,14], DSA sharing protocols [18], and private information retrieval [19]. Threshold Paillier encryption scheme: The following is a procedure that shares the Paillier decryption function among n users with the Asmuth-Bloom SSS such that when t users come together they can decrypt the ciphertext.…”
Section: Sharing Of the Paillier Decryption Functionmentioning
confidence: 99%
“…We give three novel FSSs, one for the RSA [23], one for the ElGamal decryption [13] and the other for the Paillier decryption [21] functions. These public key cryptosystems have several interesting properties useful in various applications [1,3,14,18,19]. The proposed schemes are provably secure and to the best of our knowledge they are the first realization of function sharing based on the Asmuth-Bloom SSS.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in voting scheme, such as [15,1], the authority can check the universally checkable proofs of validity of ciphertext and compute the tally. However, the result will no longer be a ciphertext that withstands CCA.…”
Section: Ind-ccamentioning
confidence: 99%