Secure Electronic Voting Protocols
Helger Lipmaa, Cybernetica AS and University of Tartu, Estonia
IND-CPA Secure Homomorphic Cryptosystems
Threshold Homomorphic Cryptosystems
How to Prove Equality of Discrete Logarithms?
Verifiable Shuffle-Based E-Voting Schemes
Security Model and Strengthening
Comparison and Practical Consideration
Information-Theoretic Privacy for Voters
Eliminating the Random Oracle Assumption
INTRODUCTION
Since the early 1990s, one of the global buzzwords (or, rather, buzz-letters) has been “e,” short for electronic, which signifies almost everything connected with (inter-)networking. The ubiquity of “e” is caused by the global penetration of the Internet and, in many places of the world, by easier availability of Internet-based services, compared to the traditional services. Numerous e-processes are already taking place, starting from e-banking and ending with (in some countries) e-government. This had led to the situation where one wants to “e-ize” most of the processes and services that can be found in a modern society. After all, moving to the e-services helps ...
Get Handbook of Information Security: Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.