نتایج جستجو برای: verifiability

تعداد نتایج: 874  

Journal: :EG 2012
John S. Dean

This paper describes Scantegrity, an electronic voting system developed by Chaum et al. (2008b), and it analyses Scantegrity’s ability to satisfy the goals of privacy and verifiability. The paper describes a programmatic attack on Scantegrity and presents findings in the form of program output for a corrupted hypothetical election. The attack takes advantage of the inherent vulnerability of ele...

2015
Satsuya Ohata Yutaka Kawai Takahiro Matsuda Goichiro Hanaoka Kanta Matsuura

In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext by a proxy, and thus can detect illegal acti...

2016
Alex Escala Sandra Guasch Javier Herranz Paz Morillo

In electronic voting, we say that a protocol has cast-asintended verifiability if the contents of each encrypted vote can be audited in order to ensure that they match the voter’s selections. It is traditionally thought that this verification can only be performed by the voter who casts the vote, since only she knows the content of her vote. In this work, we show that this is not the case: we p...

2009
Joseph Sifakis

We need an all-encompassing component-based construction framework for Mastering complexity through componentization Enhanced verifiability by compositional reasoning Comparing different architectural solutions of the same problem Motivation

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

2017
Konstantin Genin Kevin T. Kelly

Topological models of empirical and formal inquiry are increasingly prevalent. They have emerged in such diverse fields as domain theory [1, 16], formal learning theory [18], epistemology and philosophy of science [10, 15, 8, 9, 2], statistics [6, 7] and modal logic [17, 4]. In those applications, open sets are typically interpreted as hypotheses deductively verifiable by true propositional inf...

Journal: :IACR Cryptology ePrint Archive 2017
Osmanbey Uzunkol Öznur Kalkar Isa Sertkaya

We address the problem of secure and verifiable delegation of general pairing computation. We first analyze some recently proposed pairing delegation schemes and present several attacks on their security and/or verifiability properties. In particular, we show that none of these achieve the claimed security and verifiability properties simultaneously. We then provide a fully verifiable secure de...

1993
P. Camurati F. Corno P. Prinetto C. Bayol B. Soulas

The boundaries of hardware description are rapidly migrating towards higher and higher levels of abstraction. Until not long ago, designers mainly worked at register-transfer level, whereas new activities at system-level are now emerging. Systems are conceived before partitioning between hardware and software realization takes place, so that many alternatives can be explored before defining the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید