Our scheme satisfies end-to-end verifiability information theoretically in the standard model and privacy/receipt-freeness under a computational assumption (subexponential Decisional Diffie Helman). In our construction, we utilize a number of techniques used for the first time in the context of e-voting schemes that include utilizing randomness from bit-fixing sources, zero-knowledge proofs with imperfect verifier randomness and complexity leveraging.
Category / Keywords: cryptographic protocols / e-voting, standard model, end-to-end verificable Original Publication (with minor differences): IACR-EUROCRYPT-2015 Date: received 17 Apr 2015 Contact author: b zhang2009 at gmail com Available format(s): PDF | BibTeX Citation Version: 20150422:031427 (All versions of this report) Short URL: ia.cr/2015/346 Discussion forum: Show discussion | Start new discussion