2020
DOI: 10.1109/mnet.001.1900439
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 11 publications
0
11
0
1
Order By: Relevance
“…Homomorphic encryption techniques are a kind of encryption algorithm that permits users to conduct mathematical operations on encrypted data. It is a beneficial property with several applications [ 39 , 128 , 133 , 151 , 159 , 165 , 179 ]. Currently implemented completely homomorphic systems are several charges of magnitude slower than unencrypted data operations.…”
Section: Results Presentationmentioning
confidence: 99%
See 1 more Smart Citation
“…Homomorphic encryption techniques are a kind of encryption algorithm that permits users to conduct mathematical operations on encrypted data. It is a beneficial property with several applications [ 39 , 128 , 133 , 151 , 159 , 165 , 179 ]. Currently implemented completely homomorphic systems are several charges of magnitude slower than unencrypted data operations.…”
Section: Results Presentationmentioning
confidence: 99%
“…Voting makes it easier for individuals to acquire rapid and precise results and makes voting more convenient [ 38 ]. Unfortunately, this mode of voting has the most severe security weaknesses, such as the potential for hacker attacks, inadequate anonymity and privacy, and the possibility of being forced to vote a particular way [ 39 ]. Two qualities may be used to classify electronic voting systems: Remoteness; Supervision.…”
Section: Background Knowledgementioning
confidence: 99%
“…The work in Ref. [20] proposed a scheme for a self-tallying system for IoT software updates, similar to the scheme proposed in Ref. [3], which uses commitments, ZKP, blind signatures, and mix-nets to accomplish advanced security and privacy features.…”
Section: E-voting In Industrymentioning
confidence: 99%
“…[19]- [26], [26], [28], [29], [31]- [35], [53], [63]- [66], [68], [75], [76], [84], [90]- [92] [33], [38]- [41], [43], [45], [49], [51], [55], [58], [70], [72], [77], [79], [93],…”
Section: Privacyunclassified