Creator |
|
|
|
Language |
|
Publisher |
|
|
Date |
|
Source Title |
|
Vol |
|
Issue |
|
First Page |
|
Last Page |
|
Publication Type |
|
Access Rights |
|
JaLC DOI |
|
Related DOI |
|
Related URI |
|
Relation |
|
Abstract |
Recently, many cryptographic techniques have been used for secure e-voting systems and e-auction systems. In this paper, we compare the used cryptographic techniques of e-voting systems with those of ...e-auction systems. We analyze advantages and disadvantages of various cryptographic techniques through e-voting systems and e-auction systems. Also, we discuss receipt-freeness which is one of the important requirements in e-voting systems and e-auction systems. Several receipt-free schemes have been proposed to prevent a vote-coercion (e-voting) or a bid-rigging (e-auction). In this paper, we analyze the existing receipt-free schemes and point out that the existing receipt-free schemes for the e-auction system do not prevent the bid-rigging. Moreover, we show the simulation results of computational costs in e-voting systems and e-auction systems which used the similar cryptographic techniques.show more
|