Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359804
|View full text |Cite
|
Sign up to set email alerts
|

Koinonia

Abstract: Despite years of research, many existing e-voting systems do not adequately protect voting privacy. In most cases, such systems only achieve "immediate privacy", that is, they only protect voting privacy against today's adversaries, but not against a future adversary, who may possess better attack technologies like new cryptanalysis algorithms and/or quantum computers. Previous attempts at providing long-term voting privacy (dubbed "everlasting privacy" in the literature) often require additional trusts in par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 45 publications
(61 reference statements)
0
3
0
Order By: Relevance
“…Therefore, evaluating its effectiveness necessitates considering the significance or precedence of individual classifiers under particular conditions. This aspect has received thorough examination within the fault classification domain [52,53]. The voting method is given by the following:…”
Section: Voting Methodsmentioning
confidence: 99%
“…Therefore, evaluating its effectiveness necessitates considering the significance or precedence of individual classifiers under particular conditions. This aspect has received thorough examination within the fault classification domain [52,53]. The voting method is given by the following:…”
Section: Voting Methodsmentioning
confidence: 99%
“…Thus, this topic covers secret sharing and secure multi-party communication schemes. Protection of the shares and their transmissions are also relevant here, as are commitment schemes that allow one to commit to a chosen value while keeping it hidden from others [37][38][39][40]. Module 8: Secure multi-party computation and homomorphic encryption.…”
Section: Modules Mapped Directly From E-votingmentioning
confidence: 99%
“…), Information Security Education for Cyber Resilience (pp. [27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43]. Springer International Publishing.…”
Section: Introductionmentioning
confidence: 99%