نتایج جستجو برای: verifiability

تعداد نتایج: 874  

2011
Kun Peng

VSS (verifiable secret sharing) is an important security protection tool in distributed systems. When VSS is employed in publicly verifiable applications, it needs to achieve public verifiability and be upgraded to PVSS (publicly verifiable secret sharing). Besides the two basic security properties, bindingness and hidingness, PVSS concentrates on public verifiability of validity all the operat...

2014
Nisvan Erkal Steven Y. Wu Brian Roe

We develop a model of strategic contractual incompleteness that identifies conditions under which principals might omit even costlessly verifiable terms. We then use experiments to test comparative statics predictions of the model. While it is well known that verifiability imperfections can limit complete contracting, researchers know less about how the degree of imperfection affects endogenous...

2012
Maina M. Olembo Anna Kahlert Stephan Neumann Melanie Volkamer

We discuss the use of POLYAS, an Internet voting system, in GI (German Society for Computer Scientists (Gesellschaft für Informatik e.V.)) elections before 2010, in 2010 and 2011, as well as in the future. We briefly describe how the system was extended in 2010 to provide partial verifiability and how the integrity of the GI election result was verified in the 2010 and 2011 elections. Informati...

1986
Owen Greene

iii Preface Hundreds or even thousands of international legal instruments on "the environment" are in existence. What happens to international environmental agreements once they are signed, and how does the process of implementing such agreements influence their effectiveness? These are the questions that motivate the IIASA project "Implementation and Effectiveness of International Environmenta...

2016
Shirow MITOMI

SUMMARY Multisignature scheme realizes that plural users generate the signature on a message, and that the signature is verified. Various studies on multisignature have been proposed([2], [6], [11], [15], [18]). They are classified into two types: RSA([13])-based multisignature([6], [11]), and discrete logarithm problem(DLP) based multisig-nature([2], [15], [18]), all of which assume that a mes...

Journal: :Journal of biomedical informatics 2006
Mary G. Egan

Numerous metrics have been developed that attempt to assess the reliability of phylogenetic trees. Several of these commonly used measures of tree and tree branch support are described and discussed in the context of their relationship to Popperian corroboration. Claims that measures of support indicate the accuracy of phylogenetic trees or provide information for tree choice are rebutted. Meas...

Journal: :International Journal of Computer Applications 2017

2016
David Bernhard Oksana Kulyk Melanie Volkamer

The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy, but it does not provide participation privacy (i.e. it reveals who participated in the election). Kulyk, Teague and Volkamer proposed an extension to Helios that is claimed to provide ballot privacy as well as participation privacy while providing verifiability against a malicious bulletin boa...

Journal: :IACR Cryptology ePrint Archive 2017
Kristian Gjøsteen Martin Strand

After the trials of remote internet voting for local elections in 2011 and parliamentary elections in 2013, a number of local referendums has renewed interest in internet voting in Norway. The voting scheme used in Norway is not quantum-safe and it has limited voter verifiability. In this case study, we consider how we can use fully homomorphic encryption to construct a quantum-safe voting sche...

2004
Nils Meißner Volker Hartmann Dieter Richter

When developing a catalogue of technical requirements for online voting systems to be used in legally ruled, non-parliamentary elections, major interdisciplinary problems arise which currently cannot be solved. Technical requirements are not yet definable due to lacking legal preconditions, and legal definitions are not yet definable due to lacking technical experience. Problems of this type ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید