نتایج جستجو برای: asymmetric verifiability

تعداد نتایج: 66461  

Journal: :The Nonproliferation Review 2009

Journal: :IEEE Computer 2023

Autonomous systems have the promise to address many of our societal challenges in a variety areas. To realize this potential, these need be trustworthy. We describe research carried out by U.K. consortium central issue establishing trustworthiness: verifiability.

2005
Jonathan Glover Yuji Ijiri Carolyn Levine Pierre Liang

1 When fair value cannot be measured by reference to matters that are directly observable, and if the measure represents little more than the measurer's state of mind, neither the measurement nor the measurement method are verifiable. In those circumstances, the independent auditor has a scope limitation and should not express an unqualified opinion on the financial statements that are material...

Journal: :Journal of Accounting, Auditing & Finance 2006

2010
Benoît Chevallier-Mames Pierre-Alain Fouque David Pointcheval Julien Stern Jacques Traoré

In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. This paper is a work in progress. More specifically, we focus on the universal verifiability of the computation of the tally, on the unconditional privacy/anonymity of the votes, and on the receipt-freeness properties. More precisely, under usual ass...

2005
Orhan Çetinkaya Ali Doğanaksoy

In this paper, we review the electronic voting protocols based on blind signature scheme. These protocols try to fulfil the following electronic voting requirements: eligibility, privacy, receipt-freeness, fairness, accuracy, individual verifiability and universal verifiability. Some of them like eligibility and privacy are easily achieved by the nature of blind signatures; on the other hand, s...

Journal: :IACR Cryptology ePrint Archive 2016
Gina Gallegos-García Vincenzo Iovino Alfredo Rial Peter B. Rønne Peter Y. A. Ryan

In e-voting protocol design, cryptographers must balance usability and strong security guarantees, such as privacy and verifiability. In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes the tally. Some protocols replace the trusted authority by a set of authorities, and privacy is guaranteed if less than a threshold number of au...

2015
Clémentine Gritti Willy Susilo Thomas Plantard

We present a Dynamic Provable Data Possession (PDP) system with Public Verifiability and Data Privacy. Three entities are involved: a client who is the owner of the data to be stored, a server that stores the data and a Third Party Auditor (TPA) who may be required when the client wants to check the integrity of its data stored on the server. The system is publicly verifiable with the possible ...

Journal: :IACR Cryptology ePrint Archive 2013
Véronique Cortier David Galindo Stéphane Glondu Malika Izabachène

Most voting schemes aim at providing verifiability: voters should be able to check that their ballots did contribute to the outcome (individual verifiability) and that the tallying authorities did their job properly (universal verifiability). Surprisingly, verifiability still does not answer a very simple and natural question: how can I be sure that the published result corresponds to the (sum ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید