2003
DOI: 10.1007/3-540-36504-4_2
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(37 citation statements)
references
References 14 publications
0
37
0
Order By: Relevance
“…In the scheme of Furukawa et al [13], each mix-server not only re-encrypts and permutes its input, but also partially decrypts it. As a result, the final list L k essentially contains the plaintexts and no joint decryption step is needed.…”
Section: Mix-nets Based On Homomorphic Cryptosystemsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the scheme of Furukawa et al [13], each mix-server not only re-encrypts and permutes its input, but also partially decrypts it. As a result, the final list L k essentially contains the plaintexts and no joint decryption step is needed.…”
Section: Mix-nets Based On Homomorphic Cryptosystemsmentioning
confidence: 99%
“…Thus, most previous work on reducing the complexity, e.g. [21,14,18,13,30], focus on reducing the complexity of a particular proof of a shuffle. Some parts of these proofs can easily be pre-computed as well.…”
Section: Previous Work On Improving Efficiencymentioning
confidence: 99%
“…There are two known approaches to proving a correct shuffle efficiently. These are introduced by Furukawa et al [19,20,21], and Neff [37,38] respectively. Groth [27] generalizes Neff's protocol to form an abstract protocol for any homomorphic cryptosystem.…”
Section: Previous Workmentioning
confidence: 99%
“…[38,20,49], the mix-servers form a chain, and each mix-server randomly permutes, partially decrypts, and re-encrypts the output of the previous mix-server. In older constructions decryption is instead carried out jointly at the end of the chain.…”
Section: A Sender Verifiable El Gamal Based Mix-netmentioning
confidence: 99%
“…Secondly, some details of the proof (for example, the efficiency optimisation mechanism in [8]) are too complex to be easily understood or strictly analysed. Thirdly, the proofs in [6], [13] and [15] are not honest-verifier zero knowledge as pointed out in [10], [15] and [14]. So their privacy cannot be strictly and formally guaranteed.…”
Section: Introductionmentioning
confidence: 99%