cuticle 发表于 2025-3-25 05:04:20
http://reply.papertrans.cn/31/3002/300187/300187_21.pngSPER 发表于 2025-3-25 10:49:37
http://reply.papertrans.cn/31/3002/300187/300187_22.pngAtheroma 发表于 2025-3-25 14:47:16
http://reply.papertrans.cn/31/3002/300187/300187_23.pngIndict 发表于 2025-3-25 16:56:16
https://doi.org/10.1007/978-3-662-34574-0 proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.Phagocytes 发表于 2025-3-25 20:53:51
Not-So Hidden Information:,ow that as the number of candidates increases, the adversary’s advantage through the use of contracts decreases. We also consider the use of contracts in a heterogeneous population of voters and for financially constrained adversaries.GRAVE 发表于 2025-3-26 03:33:48
,Improving and Simplifying a Variant of Prêt à Voter, proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.BLAZE 发表于 2025-3-26 07:31:35
http://reply.papertrans.cn/31/3002/300187/300187_27.pngAmnesty 发表于 2025-3-26 10:34:17
Minimum Disclosure Counting for the Alternative Vote,nd coercion via subtle signature attacks during the counting. We introduce a minimum disclosure counting scheme for the alternative vote preferential system. Minimum disclosure provides protection from signature attacks by revealing only the winning candidate.amnesia 发表于 2025-3-26 13:44:05
Reports of China’s Basic Researchd in detail. The question of whether certain types of graphics would help people with cognitive disabilities vote is then considered in light of research and best practices for usability and accessibility.palliative-care 发表于 2025-3-26 18:31:17
http://reply.papertrans.cn/31/3002/300187/300187_30.png