Nothing Special   »   [go: up one dir, main page]

Zhang et al., 2020 - Google Patents

Design and implementation of an e-voting system based on Paillier encryption

Zhang et al., 2020

Document ID
150896376842174589
Author
Zhang M
Romero S
Publication year
Publication venue
Advances in Information and Communication: Proceedings of the 2020 Future of Information and Communication Conference (FICC), Volume 1

External Links

Snippet

With the rapid development of cloud computing technology, cloud services are gaining wider application space. It gives users the advantage of computing power and storage space that were beyond the reach of the past. However, user privacy and data security are the main …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • G06F2207/7223Randomisation as countermeasure against side channel attacks
    • G06F2207/7233Masking, e.g. (A**e)+r mod n
    • G06F2207/7247Modulo masking, e.g. A**e mod (n*r)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators

Similar Documents

Publication Publication Date Title
Chaieb et al. Verify-your-vote: A verifiable blockchain-based online voting protocol
Killer et al. Provotum: A blockchain-based and end-to-end verifiable remote electronic voting system
Kulyk et al. Extending helios towards private eligibility verifiability
Hohenberger et al. ANONIZE: A large-scale anonymous survey system
Kumar et al. A secure anonymous e-voting system using identity-based blind signature scheme
Locher et al. Verifiable internet elections with everlasting privacy and minimal trust
Mateu et al. A hybrid approach to vector-based homomorphic tallying remote voting
Aranha et al. Lattice-based proof of shuffle and applications to electronic voting
Chaieb et al. Loki vote: A blockchain-based coercion resistant e-voting protocol
Ling et al. Accountable tracing signatures from lattices
Wahby et al. An airdrop that preserves recipient privacy
Marcos del Blanco et al. Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm
Smart et al. True trustworthy elections: remote electronic voting using trusted computing
Zhang et al. Design and implementation of an e-voting system based on Paillier encryption
Chaieb et al. Dabsters: A privacy preserving e-voting protocol for permissioned blockchain
Zhang et al. Statement voting
Perera et al. Achieving strong security and verifier-local revocation for dynamic group signatures from lattice assumptions
Venugopalan et al. Bbb-voting: 1-out-of-k blockchain-based boardroom voting
Finogina et al. How (not) to achieve both coercion resistance and cast as intended verifiability in remote evoting
Gjøsteen et al. Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme
Doan et al. Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections
Kulyk et al. Efficiency comparison of various approaches in e-voting protocols
Bibiloni et al. Vote validatability in mix-net-based eVoting
Killer et al. From centralized to decentralized remote electronic voting
Gong et al. Blockchain-based threshold electronic voting system