Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Persson, G. Goldkuhl (2010)
Government Value Paradigms - Bureaucracy, New Public Management, and E-GovernmentCommun. Assoc. Inf. Syst., 27
S. As-Saber, K. Hossain, Aashish Srivastava (2007)
Technology, society and e-government: in search of an eclectic frameworkElectron. Gov. an Int. J., 4
P. Kirchner (2011)
Improved Generalized Birthday AttackIACR Cryptol. ePrint Arch., 2011
W. Ogata, K. Kurosawa, Kazue Sako, K. Takatani (1997)
Fault tolerant anonymous channel
A. Fujioka, T. Okamoto, K. Ohta (1992)
A Practical Secret Voting Scheme for Large Scale Elections
C. Quental, Luis Gouveia (2014)
Web Platform for Public E-Participation Management: A Case Study, 1
H. Thompson, D. Beech, Murray Maloney, N. Mendelsohn (2004)
XML-Schema Part 1: Structures Second Edition
D. Chaum (1985)
Security without identification: transaction systems to make big brother obsoleteCommun. ACM, 28
J. Camenisch, Anna Lysyanskaya (2001)
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity RevocationIACR Cryptol. ePrint Arch., 2001
R. Medaglia (2012)
eParticipation research: Moving characterization forward (2006-2011)Gov. Inf. Q., 29
I. Damgård, M. Jurik (2000)
A Generalisation, a Simplification and some Applications of Paillier’s Probabilistic Public-Key SystemBRICS Report Series, 7
(2000)
A practical and provably secure coalitionresistant group signature scheme', Advances in Cryptology–CRYPTO
com (2013) Xquery Tutorial
Kazue Sako, J. Kilian (1995)
Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth
F. Sabatini, Francesco Sarracino (2014)
E-Participation: Social Capital and the InternetCultural Anthropology eJournal
Choonsik Park, Kazutomo Itoh, K. Kurosawa (1994)
Efficient Anonymous Channel and All/Nothing Election Scheme
(2002)
Optimistic mixing for exit-polls', Advances in Cryptology–ASIACRYPT
I. Damgård, Jens Groth, G. Salomonsen (2003)
The Theory and Implementation of an Electronic Voting System
F. Buccafurri, Lidia Fotia, G. Lax (2012)
Allowing Continuous Evaluation of Citizen Opinions through Social Networks
A. Kiayias, M. Yung (2006)
Secure scalable group signature with dynamic joins and separable authoritiesInt. J. Secur. Networks, 1
D. Boneh, Xavier Boyen, H. Shacham (2004)
Short Group Signatures
Iryna Susha, Å. Grönlund (2012)
eParticipation research: Systematizing the fieldGov. Inf. Q., 29
M. Blum (1983)
Coin flipping by telephone a protocol for solving impossible problems
J. Camenisch, Anna Lysyanskaya (2004)
Signature Schemes and Anonymous Credentials from Bilinear Maps
D. Naccache, N. Smart, J. Stern (2004)
Advances in Cryptology - EUROCRYPT 2004, 3027
Jason Holt, K. Seamons (2002)
Selective disclosure credential setsIACR Cryptol. ePrint Arch., 2002
Masayuki Abe (1998)
Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers
D. Chaum (1981)
Untraceable electronic mail, return addresses, and digital pseudonyms
F. Buccafurri, Lidia Fotia, G. Lax (2013)
Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation
A. Fiat, A. Shamir (1986)
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
D. Chaum, J. Evertse (1986)
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
A. Macintosh (2004)
Characterizing e-participation in policy-making37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
Zahid Parvez (2006)
Informatization of local democracy: A structuration perspectiveInf. Polity, 11
G. Brassard, D. Chaum, C. Crépeau (1988)
Minimum Disclosure Proofs of KnowledgeJ. Comput. Syst. Sci., 37
R. Merkle (1978)
Secure communications over insecure channelsCommun. ACM, 21
(1997)
Secret-Key Certificates, US Patent 5
S. Brands (1993)
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
D. Coppersmith (1986)
Another Birthday Attack
S. Brands (2000)
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
E. Bertino, E. Ferrari, A. Squicciarini (2004)
Privacy-Preserving Trust Negotiations
J. Rose, Øystein Sæbø (2008)
Establishing Political Deliberation Systems: Key Problems
D. Chaum (1988)
Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA
Pierre-Alain Fouque, G. Poupard, J. Stern (2000)
Sharing Decryption in the Context of Voting or Lotteries
S. Koussouris, Y. Charalabidis, D. Askounis (2011)
A review of the European Union eParticipation action pilot projectsTransforming Government: People, Process and Policy, 5
M. Naor (2004)
Bit commitment using pseudorandomnessJournal of Cryptology, 4
Dmitry Epstein, Mary Newhart, Rebecca Vernon (2014)
Not by technology alone: The "analog" aspects of online public engagement in policymakingGov. Inf. Q., 31
Y. Frankel, Yiannis Tsiounis, M. Yung (1998)
Fair Off-Line e-cash Made Easy
G. Persiano, Ivan Visconti (2000)
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol
Qasim Al-Mamari, B. Corbitt, V. Gekara (2013)
E‐government adoption in Oman: motivating factors from a government perspectiveTransforming Government: People, Process and Policy, 7
Oded Goldreich, S. Micali, A. Wigderson (1987)
How to play ANY mental gameProceedings of the nineteenth annual ACM symposium on Theory of computing
M. Hirt, Kazue Sako (2000)
Efficient Receipt-Free Voting Based on Homomorphic Encryption
S. Royo, Ana Yetano, Basilio Acerete (2014)
E‐Participation and Environmental Protection: Are Local Governments Really Committed?Public Administration Review, 74
V. Liagkou, G. Metakides, Apostolos Pyrgelis, C. Raptopoulos, P. Spirakis, Y. Stamatiou (2012)
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials
Sherman Chow (2009)
Real Traceable Signatures
A. Zwierko, Z. Kotulski (2007)
A Light-Weight e-Voting System with Distributed Trust
I. Damgård, M. Jurik (2001)
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
M. Burmester, E. Magkos (2003)
Towards Secure and Practical E-Elections in the New Era
M. Naor, Benny Pinkas, Reuban Sumner (1999)
Privacy preserving auctions and mechanism design
M. Girault, Robert Cohen, Mireille Campana (1988)
A Generalized Birthday Attack
D. Chaum, E. Heyst (1991)
Group Signatures
A. Acquisti (2004)
Receipt-Free Homomorphic Elections and Write-in BallotsIACR Cryptol. ePrint Arch., 2004
D. Chaum (1982)
Blind Signatures for Untraceable Payments
Melanie Bicking, A. Triantafillou, F. Henderson, Sotiris Koussouris, M. Wimmer (2011)
Lessons from monitoring and assessing EC-funded eParticipation projects: Citizen engagement and participation impact2011 IST-Africa Conference Proceedings
R. Cramer, R. Gennaro, Berry Schoenmakers (1997)
A secure and optimally efficient multi-authority election scheme
D. Chaum, I. Damgård, J. Graaf (1987)
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
S. Sharma (2004)
Assessing e-government implementationsElectron. Gov. an Int. J., 1
S. Brands (1995)
Restrictive Blinding of Secret-Key Certificates
Oded Goldreich, S. Micali, A. Wigderson (1991)
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsJ. ACM, 38
Jooho Lee, Soonhee Kim (2014)
Active Citizen E-Participation in Local Governance: Do Individual Social Capital and E-Participation Management Matter?2014 47th Hawaii International Conference on System Sciences
J. Camenisch, S. Hohenberger, Anna Lysyanskaya (2005)
Compact E-CashIACR Cryptol. ePrint Arch., 2005
In e-democracy, e-participation represents a key component, as it is the way to adapt government decisions to the real expectations of citizens. The availability of information-communication technologies represents the basis for the implementation of concrete plans of citizens' participation to the government of the community. However, there is a non trivial trade-off to manage, between security and privacy needs and opinion analysis opportunities. Indeed, whereas we have to guarantee that the action of citizens is kept anonymous, relating opinions to information about people allows the government management to coherently orient the executive action. In this paper, we present a solution of the above trade-off, by proposing a framework relying on existing social networks and working through cryptographic protocols able to ensure citizens' anonymity yet enabling opinion analysis. A careful security analysis and the addressing of the main implementation issues make the proposal ready to a secure and feasible adoption in real-life contexts. Keywords: privacy; e-democracy; social network; e-participation. Reference to this paper should be made as follows: Buccafurri, F., Fotia, L. and Lax, G. (2015) `A privacy-preserving e-participation framework allowing citizen opinion analysis', Electronic Government, An International Journal, Vol. 11, No. 3, pp.185206. Biographical notes: Francesco Buccafurri is
Electronic Government, an International Journal – Inderscience Publishers
Published: Jan 1, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.