A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting.
Jason KellerJoe KilianPublished in: ASIACRYPT (2008)
Keyphrases
- linked list
- voting schemes
- data structure
- electronic voting
- social choice
- computational social choice
- key management
- lightweight
- data sets
- solar radiation
- voting scheme
- authentication scheme
- voting method
- database
- secret sharing
- identity management
- security analysis
- covert channel
- voting rules
- security protocols
- key exchange
- security requirements
- computational complexity
- neural network