搜索结果: 1-7 共查到“军队指挥学 coercion resistance”相关记录7条 . 查询时间(0.062 秒)
Surveying definitions of coercion resistance
cryptographic protocols election schemes
font style='font-size:12px;'>
2019/7/17
We explore definitions of coercion resistance in the computational model of cryptography; discovering all but one are too weak (i.e., satisfiable by voting systems that are not coercion resistant) and...
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
electronic voting end-to-end verifiability coercion resistance
font style='font-size:12px;'>
2018/3/5
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiability, everlasting privacy and efficient coercion resistance in the JCJ setting. Everlasting privacy is ...
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
cryptographic protocols / election schemes
font style='font-size:12px;'>
2012/3/29
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitr...
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
cryptographic protocols / voting verifiability coercion-resistance privacy protocol analysis
font style='font-size:12px;'>
2012/3/26
In this paper, we present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the two forms of verifi...
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
cryptographic protocols / voting verifiability coercion-resistance privacy protocol analysis
font style='font-size:12px;'>
2012/3/26
In this paper, we present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the two forms of verifi...
Proving Coercion-Resistance of Scantegrity II
E-Voting Coercion-Resistance Protocol Analysis
font style='font-size:12px;'>
2010/10/11
In this paper, we prove that Scantegrity II enjoys an optimal level of coercion-resistance, i.e., the same level of coercion-resistance as an ideal voting protocol (which merely reveals the outcome of...
A Game-Based Definition of Coercion-Resistance and its Applications
Game-Based Definition Coercion-Resistance Applications
font style='font-size:12px;'>
2009/12/29
Coercion-resistance is one of the most important and intricate security requirements
for voting protocols. Several definitions of coercion-resistance have
been proposed in the literature, both in cr...