Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption by Joy
暂无分享,去创建一个
[1] Jennings Jt,et al. Voting and registration in the election of November 1982. , 1982 .
[2] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[3] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[4] Jacques Stern,et al. Practical multi-candidate election system , 2001, PODC '01.
[5] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Ted Selker. Testimony on Voter Verification , 2005 .
[7] Peter Y. A. Ryan,et al. A Dependability Analysis of the Chaum Digital Voting Scheme , 2003 .
[8] P. Ryan,et al. A Simplified Version of the Chaum Voting Scheme , 2004 .
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] C. A. Neff. Verifiable Mixing (Shuffling) of ElGamal Pairs , 2004 .
[11] C. Andrew Ne,et al. Practical high certainty intent verification for encrypted votes , 2004 .
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Aggelos Kiayias,et al. The Vector-Ballot e-Voting Approach , 2004, Financial Cryptography.
[14] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[15] Dan S. Wallach,et al. Hack-a-vote: Security issues with electronic voting systems , 2004, IEEE Security & Privacy Magazine.
[16] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[17] Rebecca T. Mercuri. A better ballot box , 2002 .