DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, B | ko |
dc.contributor.author | Boyd, C | ko |
dc.contributor.author | Dawson, E | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.contributor.author | Yang, J | ko |
dc.contributor.author | Yoo, S | ko |
dc.date.accessioned | 2013-03-05T03:36:06Z | - |
dc.date.available | 2013-03-05T03:36:06Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2004 | - |
dc.identifier.citation | INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/85291 | - |
dc.description.abstract | It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot. In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnet-based electronic voting schemes by using the well known re-encryption technique and designated verifier re-encryption proof (DVRP). In our scheme a voter has to prepare his encrypted ballot through a randomiza-tion service provided by a tamper resistant randomizer (TRR), in such a way that he finally loses his knowledge on randomness. This method can be used in most mixnet-based electronic voting scheme to provide receipt-freeness. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.subject | SCHEME | - |
dc.subject | WORK | - |
dc.title | Providing receipt-freeness in mixnet-based voting protocols | - |
dc.type | Article | - |
dc.identifier.wosid | 000189499400019 | - |
dc.identifier.scopusid | 2-s2.0-33750248003 | - |
dc.type.rims | ART | - |
dc.citation.volume | 2971 | - |
dc.citation.beginningpage | 245 | - |
dc.citation.endingpage | 258 | - |
dc.citation.publicationname | INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Lee, B | - |
dc.contributor.nonIdAuthor | Boyd, C | - |
dc.contributor.nonIdAuthor | Dawson, E | - |
dc.contributor.nonIdAuthor | Yang, J | - |
dc.contributor.nonIdAuthor | Yoo, S | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | electronic voting | - |
dc.subject.keywordAuthor | receipt-freeness | - |
dc.subject.keywordAuthor | mixnet | - |
dc.subject.keywordAuthor | re-encryption | - |
dc.subject.keywordAuthor | designated-verifier re-encryption proof | - |
dc.subject.keywordAuthor | tamper resistant randomizer | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | WORK | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.