Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Rolf Haenni"'
Autor:
Severin Hauser, Rolf Haenni
Publikováno v:
JeDEM - eJournal of eDemocracy & Open Government, Vol 8, Iss 3 (2016)
To provide universal verifiability, cryptographic voting protocols often require a broadcast channel to spread the election data to the public. The basic requirements on such a broadcast channel are similar for most protocols, for example that the ch
Externí odkaz:
https://doaj.org/article/246f201a4e2b44ceb0eddb424727891c
Autor:
Rolf Haenni, Philipp Locher
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030544546
Financial Cryptography Workshops
Financial Cryptography Workshops
In this paper, we propose further performance improvements for Wikstrom’s shuffle proof. Compared to an implementation based on general-purpose exponentiation algorithms, we show that the overall shuffle operation can be accelerated by approximatel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1fd1e6e63bfd5a6ef2bc5d75aea87f59
https://doi.org/10.1007/978-3-030-54455-3_27
https://doi.org/10.1007/978-3-030-54455-3_27
Publikováno v:
Electronic Voting ISBN: 9783030603465
E-VOTE-ID
E-VOTE-ID
The authors of this paper had the opportunity to closely accompany the CHVote project of the State of Geneva during more than two years and to continue the project after its abrupt stop in 2018. This paper is an experience report from this collaborat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::07815bac2211d7ebce4b999478d9e154
https://doi.org/10.1007/978-3-030-60347-2_7
https://doi.org/10.1007/978-3-030-60347-2_7
Autor:
Pascal Mainini, Rolf Haenni
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662588192
Financial Cryptography Workshops
Financial Cryptography Workshops
Modern web applications using advanced cryptographic methods may need to calculate a large number of modular exponentiations. Performing such calculations in the web browser efficiently is a known problem. We propose a solution to this problem based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b725d3cde0ebc211403443852edb13fb
https://doi.org/10.1007/978-3-662-58820-8_13
https://doi.org/10.1007/978-3-662-58820-8_13
Autor:
Severin Hauser, Rolf Haenni
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662588192
Financial Cryptography Workshops
Financial Cryptography Workshops
The publication of the election data is fundamental for making electronic voting systems universally verifiable. For this, voting protocols usually rely on a secure bulletin board, which keeps track of the data produced during the protocol execution.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::acf6940f719367fe714b910ff312c0dd
https://doi.org/10.1007/978-3-662-58820-8_16
https://doi.org/10.1007/978-3-662-58820-8_16
Autor:
Stephan Hartmann, Rolf Haenni
Publikováno v:
Haenni, Rolf; Hartmann, Stephan (2006). Special Issue of Minds and Machines on Causality, Uncertainty and Ignorance. Minds and machines, 16(3), pp. 237-238. Dordrecht: Springer 10.1007/s11023-006-9041-3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0fd55f189fa3aed3967e49e432154122
http://doc.rero.ch/record/313956/files/11023_2006_Article_9041.pdf
http://doc.rero.ch/record/313956/files/11023_2006_Article_9041.pdf
Publikováno v:
Electronic Voting ISBN: 9783030004187
E-Vote-ID
E-Vote-ID
In this paper, we analyze the process of performing the universal verification of an electronic election. We propose a general model of the election process and define the data flow into the verification process. We also define the purpose and outcom
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0af7ad0f95b75098b571438315106f0d
https://doi.org/10.1007/978-3-030-00419-4_6
https://doi.org/10.1007/978-3-030-00419-4_6
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783319702773
Financial Cryptography Workshops
Financial Cryptography Workshops
Implementing the shuffle proof of a verifiable mix-net is one of the most challenging tasks in the implementation of an electronic voting system. For non-specialists, even if they are experienced software developers, this task is nearly impossible to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7be5221de52441c05737a2930584b340
https://doi.org/10.1007/978-3-319-70278-0_23
https://doi.org/10.1007/978-3-319-70278-0_23
Publikováno v:
Electronic Voting ISBN: 9783319522395
E-VOTE-ID
E-VOTE-ID
In this paper, we propose a new method for cast-as-intended verification in remote electronic voting. We consider a setting, in which voters receive personalized verification code sheets from the authorities over a secure channel. If the codes displa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::499469dff230361717961b4f82cd85af
https://doi.org/10.1007/978-3-319-52240-1_5
https://doi.org/10.1007/978-3-319-52240-1_5
A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes
Autor:
Reto E. Koenig, Rolf Haenni
Publikováno v:
Computers & Security. 33:59-69
This paper presents a generic approach to prevent board flooding attacks in remote electronic voting schemes providing coercion-resistance. A key property of these schemes is the possibility of casting invalid votes to the public bulletin board, whic