Home > Research > Publications & Outputs > An Efficient E2E Verifiable E-voting System wit...

Electronic data

  • main_S+P_journal

    Rights statement: (c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works

    Accepted author manuscript, 540 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

An Efficient E2E Verifiable E-voting System without Setup Assumptions

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

An Efficient E2E Verifiable E-voting System without Setup Assumptions. / Kiayias, Aggelos ; Zacharias, Thomas ; Zhang, Bingsheng.
In: IEEE Security and Privacy Magazine, Vol. 15, No. 3, 01.05.2017, p. 14-23.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Kiayias, A, Zacharias, T & Zhang, B 2017, 'An Efficient E2E Verifiable E-voting System without Setup Assumptions', IEEE Security and Privacy Magazine, vol. 15, no. 3, pp. 14-23. https://doi.org/10.1109/MSP.2017.71

APA

Kiayias, A., Zacharias, T., & Zhang, B. (2017). An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Security and Privacy Magazine, 15(3), 14-23. https://doi.org/10.1109/MSP.2017.71

Vancouver

Kiayias A, Zacharias T, Zhang B. An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Security and Privacy Magazine. 2017 May 1;15(3):14-23. doi: 10.1109/MSP.2017.71

Author

Kiayias, Aggelos ; Zacharias, Thomas ; Zhang, Bingsheng. / An Efficient E2E Verifiable E-voting System without Setup Assumptions. In: IEEE Security and Privacy Magazine. 2017 ; Vol. 15, No. 3. pp. 14-23.

Bibtex

@article{77098e62c8314ff297828cd92c290529,
title = "An Efficient E2E Verifiable E-voting System without Setup Assumptions",
abstract = "End-to-end (E2E) verifiability is critical if e-voting systems are to be adopted for use in real-world elections. A new E2E e-voting system doesn't require additional setup assumptions and uses conventional cryptographic building blocks.",
author = "Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang",
note = "(c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works",
year = "2017",
month = may,
day = "1",
doi = "10.1109/MSP.2017.71",
language = "English",
volume = "15",
pages = "14--23",
journal = "IEEE Security and Privacy Magazine",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

RIS

TY - JOUR

T1 - An Efficient E2E Verifiable E-voting System without Setup Assumptions

AU - Kiayias, Aggelos

AU - Zacharias, Thomas

AU - Zhang, Bingsheng

N1 - (c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works

PY - 2017/5/1

Y1 - 2017/5/1

N2 - End-to-end (E2E) verifiability is critical if e-voting systems are to be adopted for use in real-world elections. A new E2E e-voting system doesn't require additional setup assumptions and uses conventional cryptographic building blocks.

AB - End-to-end (E2E) verifiability is critical if e-voting systems are to be adopted for use in real-world elections. A new E2E e-voting system doesn't require additional setup assumptions and uses conventional cryptographic building blocks.

U2 - 10.1109/MSP.2017.71

DO - 10.1109/MSP.2017.71

M3 - Journal article

VL - 15

SP - 14

EP - 23

JO - IEEE Security and Privacy Magazine

JF - IEEE Security and Privacy Magazine

SN - 1540-7993

IS - 3

ER -