2010
DOI: 10.1007/978-3-642-12678-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Proofs of Restricted Shuffles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(85 citation statements)
references
References 27 publications
0
61
0
Order By: Relevance
“…Thus, for each g i one could use a precomputed table of values (x, g x i ) for all possible values of x. Mix net matrix commitments Given the mix net scheme in [20], a substantial part of the computations can be performed without the knowledge of ciphertexts that are about to be shuffled. We therefore assume, that the voting system performs precomputations that would allow to shuffle the votes from all eligible voters.…”
Section: Time Estimationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, for each g i one could use a precomputed table of values (x, g x i ) for all possible values of x. Mix net matrix commitments Given the mix net scheme in [20], a substantial part of the computations can be performed without the knowledge of ciphertexts that are about to be shuffled. We therefore assume, that the voting system performs precomputations that would allow to shuffle the votes from all eligible voters.…”
Section: Time Estimationsmentioning
confidence: 99%
“…In order to provide robustness against faulty mix nodes, a reencryption mix net scheme is used, and for ensuring that the ciphertexts are shuffled correctly and not replaced by manipulated votes, the proof of shuffle is attached by each mix node. We chose to include the proof of shuffle suggested by [20,22] due to it being to our knowledge the most efficient algorithm, the implementation and detailed specification of which is available for open usage [23]. For the mix net scheme, the efficiency of calculating the proof of shuffle for C ciphertexts in terms of exponentiations is (C + 2)RExp + 2C · M Exp(2) + M Exp(C + 1) for the offline phase (i.e.…”
Section: Netmentioning
confidence: 99%
See 1 more Smart Citation
“…Various perfect (or statistical) ZK proof of shuffles can be used for that purpose [23,25,35]: these guarantee that a simulator can produce a proof of shuffle just from the inputs and output of that shuffle that is indistinguishable from a real proof, even by an unbounded adversary.…”
Section: Ccva Encryption For Elections With Complex Ballotsmentioning
confidence: 99%
“…The commitment consistent shuffle approach proposed by Terelius and Wikström [36,35] seems particularly natural for that purpose. This approach splits the proof of shuffle in two stages.…”
Section: Ccva Encryption For Elections With Complex Ballotsmentioning
confidence: 99%