Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

  title={Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting},
  author={Oksana Kulyk and Stephan Neumann and Jurlind Budurushi and Melanie Volkamer and Rolf Haenni and Reto E. Koenig and Phil{\'e}mon von Bergen},
  journal={2015 10th International Conference on Availability, Reliability and Security},
Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. Secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 36 references

E-Voting System General Overview

Estonian National Electoral Committee
2010. [Online]. Available: http://www.vvk.ee/public/dok/General Description E-Voting 2010.pdf • 2010
View 4 Excerpts
Highly Influenced

Decentralized e-voting on android devices using homomorphic tallying

J. Ritter
Master Thesis, Bern University of Applied Sciences, Biel, Switzerland, 2014. • 2014
View 2 Excerpts

Elec - tronic voting with fully distributed trust and maximized flexibility regarding ballot design , ” in 6 th International Conference on Electronic Voting ( EVOTE )

S. Neumann O. Kulyk, C. Feier, M. Volkamer, T. Köster

Electronic voting with fully distributed trust and maximized flexibility regarding ballot design

2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) • 2014
View 2 Excerpts

186-4. digital signature standard (dss)

National Institute of Standards and Technology (NIST), 2013. • 2013
View 1 Excerpt

Ballot secrecy and ballot independence coincide

IACR Cryptology ePrint Archive • 2013
View 1 Excerpt

Cryptographic protocols , ” in Proceedings of the fourteenth annual ACM symposium on Theory of computing

N. A. Lynch R. A. DeMillo, M. J. Merritt
IACR Election • 2013

Similar Papers

Loading similar papers…