Back to Results
First PageMeta Content
Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA


Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as Report[removed]Verifiable Elections That Scale for Free Melissa Cha
Add to Reading List

Document Date: 2014-09-03 04:47:58


Open Document

File Size: 478,39 KB

Share Result on Facebook

Company

Microsoft / /

Currency

USD / /

/

Event

FDA Phase / /

Holiday

Assumption / /

IndustryTerm

ballot processing step / mix server / last mix server / decryption server / proof systems / ballot processing phase / cryptographic tool / /

Organization

Brown University / /

Person

Sarah Meiklejohn / Anna Lysyanskaya / /

Position

extractor / IND-CPA / PPT extractor / usual IND-CPA / /

Product

Groth-Lu / CKLM / /

RadioStation

CKLM / /

Technology

adapted version Groth-Lu protocol / encryption / cryptography / three algorithms / BBS / public key / fourth algorithm / regular public-key encryption / Dec algorithm / compact threshold encryption / Groth-Lu protocol / threshold encryption / secret key / simulation / PPT algorithms / following algorithms / four algorithms / 2.3 Threshold encryption / /

SocialTag