نتایج جستجو برای: verifiability

تعداد نتایج: 874  

Journal: :Frontiers in blockchain 2023

We present a Solidity smart contract implementation of the TAVS e-voting protocol. The Two Authorities Electronic Voting Scheme (TAVS) is voting scheme that achieves universal verifiability with reduced time-complexity both for elector and system. security derives from RSA cryptosystem it employs, assumption two entities do not share information. which replaces one these an immutable in Ethereu...

Journal: :the international journal of humanities 2010
mohammad reza talebinezhad a. r. jalilifar

throughout the years, philosophers and psychologists have striven to solve the mind-boggling question of learning by juxtaposing the two competing theories, namely, empiricism and rationalism. they have usually opted for one and ruled out the other on the grounds that it cannot account for learning because theoretical and empirical evidence discredits it. since 1965, with the publication of cho...

Journal: :Behavioral and Brain Sciences 2018

2001
Fabio R. Piva José R. M. Monteiro Augusto J. Devegili Ricardo Dahab

Although fair exchange protocols are being widely implemented, there are few formal methods able to verify them. This work introduces the strand spaces method for verifying certified mail delivery protocols, a subclass of fair exchange protocols. Three fair exchange properties are verified: effectiveness, verifiability of TTP and timeliness. For effectiveness and verifiability we used the FPH p...

2011
Chris Culnane David Bismark James Heather Steve A. Schneider Sriramkrishnan Srinivasan Zhe Xia

The Prêt à Voter end-to-end verifiable voting system makes use of receipts, retained by voters, to provide individual verifiability that their vote has been recorded as cast. The paper discusses issues around the production and acceptance of receipts, and presents an alternative approach to individual verifiability based on Authentication Codes. These codes are constructed, in the encrypted dom...

2011
Md. Abdul Based Stig Fr. Mjølsnes

We describe information security requirements for a secure and functional Internet voting scheme. Then we present the voting scheme with multiple parties; this voting scheme satisfies all these security requirements. In this scheme, the voter gets a signed key from the registrar, where the registrar signs the key as blinded. The voter uses this signed key during the voting period. All other par...

2010
Stefan Popoveniuc John Kelsey Andrew Regenscheid Poorvi L. Vora

The term “end-to-end verifiability” has been used over the past several years to describe multiple voting system proposals. The term has, however, never been formally defined. As a result, its meaning tends to change from voting system to voting system. We propose a definition for end-to-end verifiability of public elections based on performance requirements, as opposed to design requirements. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید