Pseudo-code algorithms for verifiable re-encryption mix-nets

7Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Implementing the shuffle proof of a verifiable mix-net is one of the most challenging tasks in the implementation of an electronic voting system. For non-specialists, even if they are experienced software developers, this task is nearly impossible to fulfill without spending an enormous amount of resources into studying the necessary cryptographic theory. In this paper, we present one of the existing shuffle proofs in a condensed form and explain all the necessary technical details in corresponding pseudo-code algorithms. The goal of presenting the shuffle proof in this form is to make it accessible to a broader audience and to facilitate its implementation by non-specialists.

Cite

CITATION STYLE

APA

Haenni, R., Locher, P., Koenig, R., & Dubuis, E. (2017). Pseudo-code algorithms for verifiable re-encryption mix-nets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10323 LNCS, pp. 370–384). Springer Verlag. https://doi.org/10.1007/978-3-319-70278-0_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free