2021
DOI: 10.1007/978-3-030-90567-5_15
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose

Abstract: Shuffling is one of the most important techniques for privacypreserving protocols. Its applications are manifold, including, for example, e-voting, anonymous broadcast, or privacy-preserving machinelearning. For many applications, such as secure e-voting, it is crucial that the correctness of the shuffling operation be (publicly) verifiable. To this end, numerous proofs of shuffle have been proposed in the literature. Several of these proofs are actually employed in the real world. In this work, we propose a g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…NIZKP of shuffle and of correct decryption. Since there are several ways to instantiate the NIZKP of shuffle 𝜋 Shuffle for ElGamal PKE in the literature (e.g., [30,52]), we will not single out one of them. For the NIZKP of correct decryption, we can choose a standard Schnorr proof [49].…”
Section: E Instantiation Of Devos With Conditional Privacymentioning
confidence: 99%
“…NIZKP of shuffle and of correct decryption. Since there are several ways to instantiate the NIZKP of shuffle 𝜋 Shuffle for ElGamal PKE in the literature (e.g., [30,52]), we will not single out one of them. For the NIZKP of correct decryption, we can choose a standard Schnorr proof [49].…”
Section: E Instantiation Of Devos With Conditional Privacymentioning
confidence: 99%
“…While research on online voting claims that no binding public elections can be considered low-stakes [6,13], elections research frequently defines local elections as such [5,30]. Scholars argue that unlike in high-stakes elections, the financial costs of an online voting system is of particular concern for low-stakes elections [11,16]. Furthermore, in terms of security, "a weaker threat model is [seen as being] suitable" [16].…”
Section: Literature Reviewmentioning
confidence: 99%