نتایج جستجو برای: پروتکل jcj
تعداد نتایج: 4190 فیلتر نتایج به سال:
تاکنون پروتکل های امنیتی گوناگونی به منظور پیاده سازی امن و کارای رای گیری الکترونیکی راه دور در دنیا ارائه شده است. هم چنین با امکان پذیر شدن پیاده سازی این پروتکل ها، نیازمندی های جدیدی که تا پیش از این موضوعی کاملا آرمانی و دست نیافتنی به نظر می آمد، مطرح شد. پروتکل های جدید در پی یافتن راه کاری به منظور پیاده سازی این نیازمندی ها هستند. در این پژوهش، پس از تحقیق و بررسی، پروتکل jcj به خاط...
We show how to combine the individual verification mechanism of Selene with the coercion-resistant e-voting scheme from Juels, Catalano and Jakobsson (JCJ). This results in an e-voting scheme which allows the voter to check directly that her vote is counted as intended, but still allows her to mitigate coercion. We also construct variants of the protocol which provide everlasting privacy or bet...
Election verifiability is defined in the computational model of cryptography. The definition formalizes notions of voters verifying their own votes, auditors verifying the tally of votes, and auditors verifying that only eligible voters vote. The Helios (Adida et al., 2009), Helios-C (Cortier et al., 2014) and JCJ (Juels et al., 2010) election schemes are analyzed using the definition. Neither ...
We present upper and lower bounds on the minimum Euclidean distance dEmin(C) for block coded PSK. The upper bound is an analytic expression depending on the alphabet size q, the block length n and the number of codewords jCj of the code C. This bound is valid for all block codes with q 4 and with medium or high rate codes where jCj > (q=3). The lower bound is valid for Gray coded binary codes o...
Approximation results for a bicriteria job scheduling problem on a single machine without preemption
We study the problem of minimizing the average weighted completion time on a single machine under the additional constraint that the sum of completion times does not exceed a given bound B (1 !Cj B !wjCj) for which we propose a 2 1 -approximationalgorithm. We also address the problem1 !c jCj B !wjCj for which we present a 2 2 -approximation algorithm. After showing that the problem of minimizin...
Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first scheme that considers real-world threats and that is more realistic for remote elections. Their scheme, though, has quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has linear work factor. In this paper we first show that the Smith’s...
Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show tha...
Coercion-resistance is the most effective property to fight coercive attacks in Internet elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES 2005 together with a voting protocol that satisfies such a stringent security requirement. Unfortunately, their scheme has a quadratic complexity (the overhead for tallying authorities is quadratic in the number of votes) ...
Internet voting continues to enjoy wide interest from both research and practice. Among the Internet voting schemes developed over the last decades, JCJ / Civitas stands out from the masses due to its innovative approach to resist voter coercion. To achieve its ambitious goal, the scheme builds upon particularly restrictive assumptions and an abstract credential handling rendering the scheme im...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید