搜索结果: 1-7 共查到“军事学 helios”相关记录7条 . 查询时间(0.078 秒)
We study game-based definitions of individual and universal verifiability by Smyth, Frink & Clarkson. We prove that building voting systems from El Gamal coupled with proofs of correct key generation ...
Recent results show that the current implementation of Helios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on...
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
fiat-shamir zero-knowledge random oracle model
2016/12/10
This paper is concerned with two variants of the transformation that appear but have not been clearly delineated in existing literature. Both variants start with the prover making a commitment. The st...
Security Proofs for Participation Privacy and Stronger Veriability for Helios
voting participation privacy privacy
2016/5/3
The Helios voting scheme is well studied including formal
proofs for verifiability and ballot privacy, but it does not provide participation
privacy (i.e. it reveals who participated in the election...
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
election schemes individual verifiability universal verifiability
2016/1/3
Definitions of election verifiability in the computational model of cryptography are proposed. The definitions formalize notions of voters verifying their own votes, auditors verifying the tally of vo...
A generic construction for voting correctness at minimum cost - Application to Helios
voting protocols Helios correctness full correctness verifiability
2013/4/18
Most voting schemes aim at providing verifiability: voters should be able to check that their ballots did contribute to the outcome (individual verifiability) and that the tallying authorities did the...
Does Helios ensure ballot secrecy?
attack ballot secrecy electronic voting privacy vulnerability
2010/12/9
Helios is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this paper, we analyse ballot secrecy and discover a vulnerability ...