Aug. 17, 2022, 1:06 a.m. |

IACR News www.iacr.org

ePrint Report: How to Verifiably Encrypt Many Bits for an Election?

Henri Devillez, Olivier Pereira, Thomas Peters


The verifiable encryption of bits is the main computational step that is needed to prepare ballots in many practical voting protocols. Its computational load can also be a practical bottleneck, preventing the deployment of some protocols or requiring the use of computing clusters.


We investigate the question of producing many verifiably encrypted bits in an efficient and portable way, using as a baseline …

bits election encrypt eprint report

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA