Privacy-Preserving Electronic Voting

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy preserving electronic petitions

We present the design of a secure and privacy preserving epetition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyz...

متن کامل

Privacy preserving electronic data gathering

K e y w o r d s P r i v a c y , Electronic data gathering, E-voting protocols, Discrete logarithm. We would like to thank the editor and the reviewers for their concern. Moreover, we acknowledge the partial support by the "Archimedes" research programme awarded by the Greek Ministry of Education and Religious Affairs and the European Union. 0895-7177/05/$ see front matter (~ 2005 Elsevier Ltd. ...

متن کامل

Privacy-Preserving Electronic Health Records

Electronic health records enable the global availability of medical data. This has numerous benefits for the quality of offered services. However, privacy concerns may arise as now both the patient’s medical history as well as the doctor’s activities can be tracked. In this paper, we propose an electronic health record system which allows the patient to control who has access to her health reco...

متن کامل

Privacy and verifiability in electronic voting

Privacy and verifiability refer to fundamental principles of democratic elections and therefore belong to the set of established security requirements which each electronic voting scheme is expected to meet. However, very different ideas and opinions about privacy and verifiability exist in the scientific community, which shows that both properties are not well understood yet. Moreover, althoug...

متن کامل

Strong Privacy Protection in Electronic Voting

We give suggestions for protection against adversaries with access to the voter’s equipment in voting schemes based on homomorphic encryption. Assuming an adversary has complete knowledge of the contents and computations taking place on the client machine we protect the voter’s privacy in a way so that the adversary has no knowledge about the voter’s choice. Furthermore, an active adversary try...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information & Security: An International Journal

سال: 2004

ISSN: 0861-5160

DOI: 10.11610/isij.1511