Surveying definitions of coercion resistance
暂无分享,去创建一个
[1] Ben Smyth,et al. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ , 2015 .
[2] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[3] Moni Naor,et al. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy , 2006, CRYPTO.
[4] Aggelos Kiayias,et al. End-to-End Verifiable Elections in the Standard Model , 2015, EUROCRYPT.
[5] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[6] Ben Smyth,et al. Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios , 2021, J. Comput. Secur..
[7] Ben Smyth. First-past-the-post suffices for ranked voting , 2017 .
[8] Ralf Küsters,et al. A Game-Based Definition of Coercion-Resistance and Its Applications , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[9] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[10] Tatsuaki Okamoto,et al. Receipt-Free Electronic Voting Schemes for Large Scale Elections , 1997, Security Protocols Workshop.
[11] Georg Fuchsbauer,et al. BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme , 2016, CCS.
[12] Ben Smyth,et al. A critique of game-based definitions of receipt-freeness for voting , 2019, IACR Cryptol. ePrint Arch..
[13] Jörn Müller-Quade,et al. Universally Composable Incoercibility , 2009, IACR Cryptol. ePrint Arch..
[14] Ryan W. Gardner,et al. Coercion Resistant End-to-end Voting , 2009, Financial Cryptography.