Sciweavers

IJISEC
2007
87views more  IJISEC 2007»
13 years 4 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
ICICS
1997
Springer
13 years 8 months ago
Fault tolerant anonymous channel
Previous anonymous channels, called MIX nets, do not work if one center stops. This paper shows new anonymous channels which allow less than a half of faulty centers. A fault toler...
Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori...
NDSS
1999
IEEE
13 years 8 months ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell
IEEEARES
2007
IEEE
13 years 11 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy