Abstract | ||
---|---|---|
The cryptographic voting protocol presented in this paper offers public verifiability, everlasting privacy, and coercion-resistance simultaneously. Voters are authenticated anonymously based on perfectly hiding commitments and zero-knowledge proofs. Their vote and participation secrecy is therefore protected independently of computational intractability assumptions or trusted authorities. Coercion-resistance is achieved based on a new mechanism for deniable vote updating. To evade coercion by submitting a final secret vote update, the voter needs not to remember the history of all precedent votes. The protocol uses two types of mix networks to guarantee that vote updating cannot be detected by the coercer. The input sizes and running times of the mix networks are quadratic with respect to the number of submitted ballots. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-662-53357-4_11 | Lecture Notes in Computer Science |
Field | DocType | Volume |
Precedent,Internet privacy,Authentication,Voting,Computer security,Computer science,Cryptography,Secrecy,Mathematical proof,Information privacy,Privacy software | Conference | 9604 |
ISSN | Citations | PageRank |
0302-9743 | 6 | 0.42 |
References | Authors | |
4 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Philipp Locher | 1 | 16 | 4.12 |
Rolf Haenni | 2 | 371 | 33.39 |
Reto E. Koenig | 3 | 83 | 8.38 |