#### DMCA

## An information-theoretic model of voting systems

### Cached

### Download Links

- [www.seas.gwu.edu]
- [www.seas.gwu.edu]
- [home.gwu.edu]
- [vote.cs.gwu.edu]
- [www.seas.gwu.edu]
- DBLP

### Other Repositories/Bibliography

Venue: | MATHEMATICAL AND COMPUTER MODELLING |

Citations: | 1 - 0 self |

### Citations

1575 | Untraceable electronic mail, return addresses, and digital pseudonyms - Chaum - 1981 |

553 |
Theory and applications of trapdoor functions
- Yao
- 1982
(Show Context)
Citation Context ...e, roughly speaking, is the average number of bits required to represent it under the constraint that the algorithm generating the bits from the random variable is feasible in the computational model =-=[15]-=-. In certain instances, when secrecy is provided by computational assumptions, it is more appropriate to use computational entropy over “Shannon” (or absolute) entropy. We will point out these instanc... |

412 | On the design and quantification of privacy preserving data mining algorithms - Agrawal, Aggarwal - 2001 |

311 | Towards an information theoretic metric for anonymity - Serjantov, Danezis - 2002 |

298 | Limiting privacy breaches in privacy preserving data mining, in - Evfimievski, Srikant |

272 | Towards Measuring Anonymity - Diaz, Seys, et al. - 2003 |

173 | A Practical, Voter-verifiable Election Scheme - Chaum, Ryan, et al. - 2005 |

157 | Making mix nets robust for electronic voting by randomized partial checking. - Jakobsson, Juels, et al. - 2002 |

44 | Three voting protocols: Threeballot, vav, and twin - Rivest, Smith - 2007 |

35 | A variant of the Chaum voter-verifiable scheme - Ryan - 2005 |

22 | Self-tallying elections and perfect ballot secrecy. - Kiayias, Yung - 2002 |

18 | Election confidence: A comparison of methodologies and their relative effectiveness at achieving it, - Neff - 2003 |

8 | Rapid mixing and security of Chaum’s visual electronic voting - Gomulkiewicz, Klonowski, et al. - 2003 |

8 | C.: On the security of ballot receipts in e2e voting systems - Clark, Essex, et al. - 2007 |

7 | Towards a privacy measurement criterion for voting systems
- Coney, Hall, et al.
- 2005
(Show Context)
Citation Context ...echnologies include [2, 6], and several other papers from the NIST Workshop on Threats to Voting Systems [11], in particular [8, 10], provide an evaluation with respect to threats to count integrity. =-=[1]-=- provides a mathematical definition of voting system privacy, and a related entropy-based privacy measure, which our work draws heavily from. 3 Election Goals This section provides a brief list of des... |

7 |
Electronic Voting – Evaluating the Threat
- Shamos
- 1993
(Show Context)
Citation Context ...lations that are treated distinctly by the system. This paper provides an initial attempt at formalizing the framework, and presents the types of questions that can be examined using it. 2 Prior Work =-=[12]-=- contains one of the earliest list of voting system requirements, and many papers in the recent WOTE 2001 [14] and WEST 2002 [13] workshops also include overviews of voting system requirements [4, 5, ... |

7 | de Graaf. A verifiable voting protocol based on Farnel - Araújo, Custódio, et al. - 2010 |

7 | Secret ballot elections with unconditional integrity. Cryptology ePrint Archive, Report 2007/270 - Chaum, Graaf, et al. - 2007 |

7 | The evaluation of voting technology - Jones - 2003 |

5 | An Introduction to Punchscan. IAVoSS Workshop On Trustworthy Elections (WOTE’06 - Popoveniuc, Hosp - 2006 |

3 |
Voting System Requirements
- Gerck
- 2001
(Show Context)
Citation Context ...rk [12] contains one of the earliest list of voting system requirements, and many papers in the recent WOTE 2001 [14] and WEST 2002 [13] workshops also include overviews of voting system requirements =-=[4, 5, 7]-=-. None provide a means of measuring performance with respect to the requirements. Papers on evaluating voting technologies include [2, 6], and several other papers from the NIST Workshop on Threats to... |

3 | An information-theoretic approach to inference attacks on random data perturbation and a related privacy measure - Vora - 2007 |

2 |
Requirements for Electronic and Internet Voting Systems in Public Elections, Compaq Systems Research Center," [online document
- Jefferson
(Show Context)
Citation Context ...rk [12] contains one of the earliest list of voting system requirements, and many papers in the recent WOTE 2001 [14] and WEST 2002 [13] workshops also include overviews of voting system requirements =-=[4, 5, 7]-=-. None provide a means of measuring performance with respect to the requirements. Papers on evaluating voting technologies include [2, 6], and several other papers from the NIST Workshop on Threats to... |

2 | Approximate measurement of voter privacy loss in an election with precinct reports - Crutchfield, Molnar, et al. - 2006 |

1 | Usability and voting technology - Conrad |

1 |
Evaluating voting technology. http://www.cs.uiowa.edu/ jones/voting/uscrc.html
- Jones
- 2001
(Show Context)
Citation Context ...kshops also include overviews of voting system requirements [4, 5, 7]. None provide a means of measuring performance with respect to the requirements. Papers on evaluating voting technologies include =-=[2, 6]-=-, and several other papers from the NIST Workshop on Threats to Voting Systems [11], in particular [8, 10], provide an evaluation with respect to threats to count integrity. [1] provides a mathematica... |

1 |
End-to-end standards for accuracy in paper-based systems
- Jones
- 2002
(Show Context)
Citation Context ...rk [12] contains one of the earliest list of voting system requirements, and many papers in the recent WOTE 2001 [14] and WEST 2002 [13] workshops also include overviews of voting system requirements =-=[4, 5, 7]-=-. None provide a means of measuring performance with respect to the requirements. Papers on evaluating voting technologies include [2, 6], and several other papers from the NIST Workshop on Threats to... |

1 |
Threats to voting systems, NIST Workshop on Threats to Voting Systems
- Jones
- 2005
(Show Context)
Citation Context ...performance with respect to the requirements. Papers on evaluating voting technologies include [2, 6], and several other papers from the NIST Workshop on Threats to Voting Systems [11], in particular =-=[8, 10]-=-, provide an evaluation with respect to threats to count integrity. [1] provides a mathematical definition of voting system privacy, and a related entropy-based privacy measure, which our work draws h... |

1 |
workshop on election standards and technology
- WEST
- 2002
(Show Context)
Citation Context ...nts the types of questions that can be examined using it. 2 Prior Work [12] contains one of the earliest list of voting system requirements, and many papers in the recent WOTE 2001 [14] and WEST 2002 =-=[13]-=- workshops also include overviews of voting system requirements [4, 5, 7]. None provide a means of measuring performance with respect to the requirements. Papers on evaluating voting technologies incl... |