2013 IEEE 10th International Conference on E-Business Engineering 2013
DOI: 10.1109/icebe.2013.74
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Preserving Proxy Voting System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…Furthermore, a number of protocols were made to conduct cryptographic proxy voting [37], [38]. The first protocol [37] introduces delegation to different proxies with different priorities by using hash chain elements as credentials.…”
Section: B Proxy Votingmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, a number of protocols were made to conduct cryptographic proxy voting [37], [38]. The first protocol [37] introduces delegation to different proxies with different priorities by using hash chain elements as credentials.…”
Section: B Proxy Votingmentioning
confidence: 99%
“…This approach, however, does not offer verifiability for external observers and does not allow for vote updating or voter credentials reuse. In the second protocol [38], the voters either encrypts and casts the vote published by their chosen proxy at the beginning of the election, or cast the encrypted name of their chosen proxy as their vote. Hence, vote secrecy for the votes cast by proxies is not ensured.…”
Section: B Proxy Votingmentioning
confidence: 99%
“…As Internet voting has been gaining attention in both research and practical applications in real-world elections [1], a number of Internet voting schemes have also been designed to support the latter case for proxy voting [2,3,4,5]. In particular, one of these schemes [5] extends the well-established Internet voting scheme, Helios [6], towards proxy voting functionality.…”
Section: Introductionmentioning
confidence: 99%
“…Two widely known implementations are LiquidFeedback 3 and Adhocracy 4 . Further proxy voting proposals are the approaches proposed in [19] and [21].…”
Section: Introductionmentioning
confidence: 99%