نتایج جستجو برای: پروتکل jcj

تعداد نتایج: 4190  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی 1390

تاکنون پروتکل های امنیتی گوناگونی به منظور پیاده سازی امن و کارای رای گیری الکترونیکی راه دور در دنیا ارائه شده است. هم چنین با امکان پذیر شدن پیاده سازی این پروتکل ها، نیازمندی های جدیدی که تا پیش از این موضوعی کاملا آرمانی و دست نیافتنی به نظر می آمد، مطرح شد. پروتکل های جدید در پی یافتن راه کاری به منظور پیاده سازی این نیازمندی ها هستند. در این پژوهش، پس از تحقیق و بررسی، پروتکل jcj به خاط...

2017
Vincenzo Iovino Alfredo Rial Peter B. Rønne Peter Y. A. Ryan

We show how to combine the individual verification mechanism of Selene with the coercion-resistant e-voting scheme from Juels, Catalano and Jakobsson (JCJ). This results in an e-voting scheme which allows the voter to check directly that her vote is counted as intended, but still allows her to mitigate coercion. We also construct variants of the protocol which provide everlasting privacy or bet...

2017
Ben Smyth Steven Frink Michael R. Clarkson

Election verifiability is defined in the computational model of cryptography. The definition formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009), Helios-C (Cortier et al., 2014) and JCJ (Juels et al., 2010) election schemes are analyzed using the definition. Neither ...

1997
Magnus Nilsson

We present upper and lower bounds on the minimum Euclidean distance dEmin(C) for block coded PSK. The upper bound is an analytic expression depending on the alphabet size q, the block length n and the number of codewords jCj of the code C. This bound is valid for all block codes with q 4 and with medium or high rate codes where jCj > (q=3). The lower bound is valid for Gray coded binary codes o...

Journal: :Inf. Process. Lett. 2005
Eric Angel Evripidis Bampis Laurent Gourvès

We study the problem of minimizing the average weighted completion time on a single machine under the additional constraint that the sum of completion times does not exceed a given bound B (1 !Cj B !wjCj) for which we propose a 2 1 -approximationalgorithm. We also address the problem1 !c jCj B !wjCj for which we present a 2 2 -approximation algorithm. After showing that the problem of minimizin...

2007
Roberto Araújo Sébastien Foulle Jacques Traoré

Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first scheme that considers real-world threats and that is more realistic for remote elections. Their scheme, though, has quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has linear work factor. In this paper we first show that the Smith’s...

2010
Roberto Araújo Sébastien Foulle Jacques Traoré

Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show tha...

Journal: :International Journal of Computer Applications 2015

2010
Roberto Araújo Narjes Ben Rajeb Riadh Robbana Jacques Traoré Souheib Yousfi

Coercion-resistance is the most effective property to fight coercive attacks in Internet elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES 2005 together with a voting protocol that satisfies such a stringent security requirement. Unfortunately, their scheme has a quadratic complexity (the overhead for tallying authorities is quadratic in the number of votes) ...

2013
Stephan Neumann Christian Feier Melanie Volkamer Reto E. Koenig

Internet voting continues to enjoy wide interest from both research and practice. Among the Internet voting schemes developed over the last decades, JCJ / Civitas stands out from the masses due to its innovative approach to resist voter coercion. To achieve its ambitious goal, the scheme builds upon particularly restrictive assumptions and an abstract credential handling rendering the scheme im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید