GREG 发表于 2025-3-26 21:26:46
Formal Model-Based Validation for Tally Systems,ing all past elections and seeing if the new system gives the same answer as an older, perhaps erroneous, system did. This amounts to a few dozen system tests and, typically, few-to-no unit tests. These systems are used today in a dozen countries to determine the outcome of national elections. ThisASTER 发表于 2025-3-27 03:55:30
http://reply.papertrans.cn/31/3002/300185/300185_32.pngHypomania 发表于 2025-3-27 08:03:07
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System, their vote has been cast and recorded as intended. For this to work properly, a secure and independent auxiliary channel for transmitting the verification codes to the voters is required. The Norwegian system assumes that SMS satisfies the necessary requirements for such a channel. This paper demon湿润 发表于 2025-3-27 11:41:37
http://reply.papertrans.cn/31/3002/300185/300185_34.png杂役 发表于 2025-3-27 15:48:51
http://reply.papertrans.cn/31/3002/300185/300185_35.png与野兽博斗者 发表于 2025-3-27 18:10:51
http://reply.papertrans.cn/31/3002/300185/300185_36.pngMaximizer 发表于 2025-3-27 23:27:40
Mental Models of Verifiability in Voting,s work, voters have been found to be confused about the concept of and motivation for verifiability in electronic voting when confronted with it. In order to better communicate verifiability to voters, we identify mental models of verifiability in voting using a questionnaire distributed online in G协奏曲 发表于 2025-3-28 04:07:51
,Prêt à Voter Providing Everlasting Privacy,ymisation process, such that only unconditional hiding commitments and zero knowledge proofs are published for verification, thus ensuring privacy towards the public. This paper presents a security analysis carried out in a collaboration between computer scientists and legal researchers. On the techprodrome 发表于 2025-3-28 09:54:41
http://reply.papertrans.cn/31/3002/300185/300185_39.pnginstitute 发表于 2025-3-28 12:57:18
A Practical Coercion Resistant Voting Scheme Revisited,ks and can be applied in large scale voting scenarios as it has linear time complexity. However, this scheme has two intrinsic drawbacks. As it does not allow revocation of credentials of ineligible voters, voters need to obtain fresh credentials before each new election. Also, authorities could gen