Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jun 23, 2022 · In this paper, we observe that they fall short when one seeks to obtain receipt-freeness, that is, when corrupted voters who submit chosen ...
Jan 25, 2023 · A Traceable Receipt-Free Encryption scheme (TREnc) is a public key encryption scheme that is augmented with a 5-tuple of algorithms :.
Traceable Receipt-free Encryption (TREnc) is a verifiable public-key encryption primitive introduced at Asiacrypt 2022. A TREnc allows randomizing ...
People also ask
In this paper, we observe that they fall short when one seeks to obtain receipt-freeness, that is, when corrupted voters who submit chosen ciphertexts ...
CCA-like game-based security definitions capture confidentiality by asking an adversary to distinguish between honestly computed encryptions of chosen ...
Abstract. CCA-like game-based security definitions capture confidentiality by asking an adversary to distinguish between honestly computed encryptions of ...
Definition. A traceable encryption (TREnc) is a public key encryption scheme. (Gen,Enc,Dec), augmented with: LGen(pk): Generates a (random) link key lk;.
Our approach builds on the recently proposed traceable receipt-free encryption (TREnc) primitive to support the design of a perfectly private audit trail.
Mar 3, 2024 · A traceable ring scheme is a ring signature except that it can restrict "excessive" anonymity. The traceable ring signature has a tag that ...