Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
暂无分享,去创建一个
Melanie Volkamer | Rolf Haenni | Reto E. Koenig | Oksana Kulyk | Jurlind Budurushi | Stephan Neumann | Philémon von Bergen
[1] Douglas Wikstr. How to Implement a Stand-alone Verifier for the Verificatum Mix-Net , 2012 .
[2] Alfred Menezes,et al. On reusing ephemeral keys in Diffie-Hellman key agreement protocols , 2010, Int. J. Appl. Cryptogr..
[3] Dalia Khader,et al. Studying Boardroom E-Voting Schemes: Usability and Trust , 2013 .
[4] Aggelos Kiayias,et al. Self-tallying Elections and Perfect Ballot Secrecy , 2002, Public Key Cryptography.
[5] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[6] Walter A. Burkhard,et al. Proceedings of the fourteenth annual ACM symposium on Theory of computing , 1982 .
[7] Feng Hao,et al. A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.
[8] Melanie Volkamer,et al. A Holistic Framework for the Evaluation of Internet Voting Systems , 2014 .
[9] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[10] Torben P. Pedersen,et al. Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem , 1992 .
[11] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[12] R. Michael Alvarez,et al. From piloting to roll-out: voting experience and trust in the first full e-election in Argentina , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).
[13] Melanie Volkamer,et al. Determine the Resilience of Evaluated Internet Voting Systems , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.
[14] Jens Groth,et al. Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast , 2004, Financial Cryptography.
[15] Douglas Wikström,et al. Proofs of Restricted Shuffles , 2010, AFRICACRYPT.
[16] Adrian Perrig,et al. SafeSlinger: easy-to-use and secure public-key exchange , 2013, MobiCom.
[17] Josh Benaloh,et al. Simple Verifiable Elections , 2006, EVT.
[18] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[19] Jens Groth,et al. Non-interactive Zero-Knowledge Arguments for Voting , 2005, ACNS.
[20] Melanie Volkamer,et al. Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting , 2011, VoteID.
[21] Véronique Cortier,et al. A generic construction for voting correctness at minimum cost - Application to Helios , 2013, IACR Cryptol. ePrint Arch..
[22] Ben Smyth,et al. Ballot Secrecy and Ballot Independence Coincide , 2013, ESORICS.
[23] Robert Sedgewick,et al. Proceedings of the seventeenth annual ACM symposium on Theory of computing , 1985, STOC 1985.
[24] Miguel Correia,et al. Efficient Byzantine-resilient reliable multicast on a hybrid failure model , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..
[25] Melanie Volkamer,et al. Electronic voting with fully distributed trust and maximized flexibility regarding ballot design , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).
[26] Josh Benaloh. Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.
[27] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[28] Melanie Volkamer,et al. Online-Wahlen fr Gremien , 2005 .
[29] Melanie Volkamer,et al. Robust electronic voting: Introducing robustness in Civitas , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.
[30] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[31] Feng Hao,et al. Anonymous voting by two-round public discussion , 2010, IET Inf. Secur..
[32] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[33] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.