نتایج جستجو برای: asymmetric verifiability
تعداد نتایج: 66461 فیلتر نتایج به سال:
We show how to extend the Helios voting system to provide eligibility verifiability without revealing who voted which we call private eligibility verifiability. The main idea is that real votes are hidden in a crowd of null votes that are cast by others but are indistinguishable from those of the eligible voter. This extended Helios scheme also improves Helios towards receipt-freeness.
The Verifiability Approach (VA) is a verbal veracity tool that assumes truth tellers provide more details can be verified and obtain higher ratio of such (verifiable details/total details) than liars. A VA meta-analysis was conducted. Results showed reported verifiable liars ( k = 20, N 1532, g 0.42). effect moderated by the presence information protocol nature statement (event-related or not)....
There are significant data privacy implications associated with Electronic Health Records (EHRs) sharing among various untrusted healthcare entities. Recently, a blockchain-based EHRs system has provided many benefits. Decentralization, anonymity, unforgeability, and verifiability all unique properties of blockchain technology. In this paper, we propose secure, EHR system. After receiving the o...
Autonomous systems are taking over the decision-making in many crucial aspects of our lives. Trust them will help users benefit from such without harming themselves. Establishing right level trust involves a holistic validation and verification process, accounting for as interactions with physical world human users. In this talk, I present ongoing effort to provide framework ensuring verifiabil...
Inductive inference is the study of learning in a recursion-theoretic framework. The basic model is that the learner sees data f(0), f(1), . . ., makes conjectures e1, e2, . . . (these are programs) and eventually always outputs the same program, which is a program for f . This model was introduced by Gold [12]. This model, and several variants of it, have been extensively studied by several pe...
There are many ways an election can go wrong or be suspect. Perhaps ballots were lost—and known to be lost. Perhaps a memory card failed—and was known to have failed. Perhaps more votes were reported than there were voters. Perhaps the announced outcome is correct but the evidence supporting it is incomplete or unconvincing. Perhaps some people claim to have observed irregularities. An election...
We explore the notion of “verifiability” by analyzing a simple model of evidence production in contractual relationships with complete information. We characterize implementability in terms of the existence and form of “hard evidence.” We provide results on maximal and minimal evidence production that are, respectively, necessary and sufficient for implementation. We briefly discuss the relevan...
All voter-verifiable voting schemes in the literature require that the voter be able to see and to mark. This paper describes modifications to the Prêt à Voter and PunchScan schemes so that a voter who can either see or hear, or both, independent of marking ability, may avail of voter-verifiability without revealing her vote. The modified systems would provide privacy and integrity guarantees t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید