نتایج جستجو برای: asymmetric verifiability

تعداد نتایج: 66461  

2011
Sergiu Bursuc Gurchetan S. Grewal Mark Ryan

Individual verifiability is the ability of an electronic voting system to convince a voter that his vote has been correctly counted in the tally. Unfortunately, in most electronic voting systems the proofs for individual verifiability are non-intuitive and, moreover, need trusted devices to be checked. Based on the remote voting system JCJ/Civitas, we propose Trivitas, a protocol that achieves ...

2010
CHIEN-YUAN LAI DONG-HER SHIH CHING-CHIANG CHEN

Unified Modeling Language (UML) is a standard language for software blueprints, UML can be used to visualize, specify, construct and document software-intensive system of heritage. In the UML, the activity diagrams often are widely used to workflow and system flow in system analysis. However, the activity diagram of UML now there are still many drawbacks to be overcome, such as lacks support fo...

2017
Ben Smyth Steven Frink Michael R. Clarkson

Election verifiability is defined in the computational model of cryptography. The definition formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009), Helios-C (Cortier et al., 2014) and JCJ (Juels et al., 2010) election schemes are analyzed using the definition. Neither ...

2010
Ben Smyth Mark Ryan

Electronic voting systems are being introduced, or trialled, in several countries to provide more efficient voting procedures with an increased level of security. However, current deployment has resulted in catastrophic failure due to unrealistic trust assumptions. In particular, the trustworthiness of hardware/software and election officials has been assumed. In practice, it is very difficult ...

2017
David Bernhard Oksana Kulyk Melanie Volkamer

The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy. However, depending on its version, the scheme provides either participation privacy (hiding who participated in the election) or verifiability against malicious bulletin board (preventing election manipulation by ballot stuffing), but not both at the same time. It also does not provide receipt...

2015
Ben Smyth Steven Frink Michael R. Clarkson

Election verifiability is defined in the computational model of cryptography. The definition formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009), Helios-C (Cortier et al., 2014) and JCJ (Juels et al., 2010) election schemes are analyzed using the definition. Neither ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید