细菌等 发表于 2025-3-27 00:11:23
Aaron D. Isabelle,Nataly Z. Valles generated as a multiparty computation of a secure MAC tag applied on an encrypted message submitted by a voter. Our proposals enjoy a great level of flexibility with respect to various usability, security, and performance tradeoffs.生锈 发表于 2025-3-27 03:31:28
http://reply.papertrans.cn/31/3065/306446/306446_32.pngDri727 发表于 2025-3-27 05:47:07
https://doi.org/10.1007/978-1-349-19397-4describe how clash attacks against STAR-Vote could weaken its security guarantees: corrupt voting terminals could identify voters with identical ballot preferences and print identical receipts for them, while generating electronic ballot ciphertexts for other candidates. Each voter would then be ablCongestion 发表于 2025-3-27 12:49:05
http://reply.papertrans.cn/31/3065/306446/306446_34.png合并 发表于 2025-3-27 16:29:22
K. B. Yatsimirskii,V. P. Vasil’evused to match the cast ballots against the pre-generated encrypted code tables..Our solution provides an attractive balance of security and functional properties. It is based on well-known cryptographic building blocks and relies on standard cryptographic assumptions, which allows for relatively sim拱墙 发表于 2025-3-27 21:33:47
http://reply.papertrans.cn/31/3065/306446/306446_36.pngglomeruli 发表于 2025-3-28 00:14:56
D. Massa,A. Fullterton,R. Prinjasparency and trust base). We conclude that for many vulnerabilities of Internet voting systems, there exist related weakness in paper systems as well. The main reason why paper-based elections are perceived as more secure is historical experience. We argue that recent criticism about Internet voting讽刺滑稽戏剧 发表于 2025-3-28 03:27:11
http://reply.papertrans.cn/31/3065/306446/306446_38.pngfatuity 发表于 2025-3-28 07:57:32
Robert Krimmer,Melanie Volkamer,Carsten SchürmannIncludes supplementary material:Wordlist 发表于 2025-3-28 11:39:45
http://reply.papertrans.cn/31/3065/306446/306446_40.png