dc.contributor.author | Haines, Thomas Edmund | |
dc.contributor.author | Gritti, Clementine Jeanne Pierrette | |
dc.date.accessioned | 2020-02-13T07:57:19Z | |
dc.date.available | 2020-02-13T07:57:19Z | |
dc.date.created | 2020-01-14T09:11:11Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Lecture Notes in Computer Science (LNCS). 2019, 11759 116-133. | nb_NO |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11250/2641439 | |
dc.description.abstract | Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with end-to-end verifiability are expected to offer long term privacy, let alone guarantee it. Since good guarantees of privacy are essential to the democratic process, good guarantees of everlasting privacy must be a major goal of secure online voting systems. Various currently proposed solutions rely on unusual constructions whose security has not been established. Further, the cost of verifying the zero knowledge proofs of other solutions has only been partially analysed. Our work builds upon Moran and Naor’s solution—and its extensions, applications and generalisations—to present a scheme which is additively homomorphic, efficient to verify, and rests upon well studied assumptions. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.title | Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 116-133 | nb_NO |
dc.source.volume | 11759 | nb_NO |
dc.source.journal | Lecture Notes in Computer Science (LNCS) | nb_NO |
dc.identifier.doi | 10.1007/978-3-030-30625-0_8 | |
dc.identifier.cristin | 1771980 | |
dc.relation.project | Norges forskningsråd: 275516 | nb_NO |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article. Locked until 24.9.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-30625-0_8 | nb_NO |
cristin.unitcode | 194,63,15,0 | |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for matematiske fag | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |