A conventional approach to secret balloting in computer networks
References (18)
- et al.
Secret ballot elections in computer networks
Computers & Security
(1991) - et al.
Decision-making in an automated environment—the effects of anonymity and proximity with a group decision support system
Decision Sciences
(1991) - et al.
Electronic meeting systems to support group work
Communications of the ACM
(1991) Socially secure cryptographic election scheme
Electronics Letters
(1991)- et al.
A practical secret voting scheme for large scale elections
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
(1981)Elections with unconditionally secret ballots and disruptions equivalent to breaking RSA
- et al.
A robust and verifiable cryptographically secure election scheme
- et al.
Distributing the power of the government to enhance the privacy of votes
Cited by (3)
An anonymous voting mechanism based on the key exchange protocol
2006, Computers and SecurityCitation Excerpt :However, most of the proposed electronic voting mechanisms have to face some new problems, such as completeness, correctness, and uncoercibility. In general, the electronic voting mechanism which satisfies more properties and less limits can be adopted in the real world with higher possibility (Gramer et al., 1997; Hwang, 1996; Juang and Lei, 1996). In recent decades, a lot of requirements are introduced to make the electronic voting mechanism complete such as anonymity, fairness, convenience, robustness, mobility, uniqueness, completeness, uncoercibility, correctness, and efficiency.
A secure electronic voting protocol for general elections
2004, Computers and SecurityCitation Excerpt :In addition, the voting choices and identification numbers were published in the tally result and the certification authority can know the voting content, hence the scheme failed to satisfy anonymity. Hwang (1996) presented two electronic voting schemes. In the first scheme, voters got their identification numbers by passing on each other using the tree hierarchy.
An anonymous and flexible í-out-of-n electronic voting scheme
2006, Journal of Discrete Mathematical Sciences and Cryptography