Sciweavers

9 search results - page 1 / 2
» Coercion Resistant End-to-end Voting
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
13 years 12 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
JDCTA
2010
187views more  JDCTA 2010»
13 years 2 days ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
CSFW
2006
IEEE
13 years 11 months ago
Coercion-Resistance and Receipt-Freeness in Electronic Voting
In this paper we formally study important properties of electronic voting protocols. In particular we are interested in coercion-resistance and receipt-freeness. Intuitively, an e...
Stéphanie Delaune, Steve Kremer, Mark Ryan
ICICS
2010
Springer
13 years 3 months ago
Proving Coercion-Resistance of Scantegrity II
By now, many voting protocols have been proposed that, among others, are designed to achieve coercion-resistance, i.e., resistance to vote buying and voter coercion. Scantegrity II...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
USS
2008
13 years 7 months ago
Coercion-Resistant Tallying for STV Voting
There are many advantages to voting schemes in which voters rank all candidates in order, rather than just choosing their favourite. However, these schemes inherently suffer from ...
Vanessa Teague, Kim Ramchen, Lee Naish