找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Electronic Voting; Second International Robert Krimmer,Melanie Volkamer,Carsten Schürmann Conference proceedings 2017 Springer Internationa

[复制链接]
楼主: 选民
发表于 2025-3-23 09:41:45 | 显示全部楼层
发表于 2025-3-23 16:06:52 | 显示全部楼层
Return Code Schemes for Electronic Voting Systems,s generated as a multiparty computation of a secure MAC tag applied on an encrypted message submitted by a voter. Our proposals enjoy a great level of flexibility with respect to various usability, security, and performance tradeoffs.
发表于 2025-3-23 20:28:05 | 显示全部楼层
Eos a Universal Verifiable and Coercion Resistant Voting Protocol, votes anonymously. Voters may assume multiple pseudo identities, one of which is legitimate. We use the others to signal coercion to the Election Authority. Eos uses two mixing phases with the goal to break the connection between the voter and vote, not to preserve vote privacy (which is given alre
发表于 2025-3-24 00:48:11 | 显示全部楼层
发表于 2025-3-24 05:04:59 | 显示全部楼层
Verifiability Experiences in Government Online Voting Systems,ve implemented these properties in their voting systems. However, not all the systems have adopted the same levels of verifiability nor the same range of cryptographic mechanisms. For instance, Estonia (2013) and New South Wales (Australia, 2015) started by adopting individual verifiability to their
发表于 2025-3-24 09:39:00 | 显示全部楼层
发表于 2025-3-24 11:54:44 | 显示全部楼层
How Could Snowden Attack an Election?,e voting system itself. Instead the attack abuses the normal functionality to link the tallying of the election to disclosing sensitive information assumed to be held by the adversary. Thus the attack forces election officials to choose between two undesirable options: Not to publish the election re
发表于 2025-3-24 18:40:55 | 显示全部楼层
发表于 2025-3-24 19:18:45 | 显示全部楼层
Estonian Voting Verification Mechanism Revisited Again,nts to the weaknesses and questionable design choices of the new scheme. We show that the scheme does not fix the vote privacy issue it claims to. It also introduces a way for a malicious voting application to manipulate the vote without being detected by the verification mechanism, hence breaking t
发表于 2025-3-24 23:43:11 | 显示全部楼层
https://doi.org/10.1007/978-94-010-9428-3at Eve acts as maliciously as possible. From an economic perspective, Eve tries to maximize her utility in a game with other participants. The game’s rules are determined by the system and its security mechanisms, but Eve can invent new ways of interacting with participants. We show that Eve can be
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 07:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表