Software Design for VEC vVote System

[1]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[2]  Zhe Xia,et al.  PrÊt À Voter: a Voter-Verifiable Voting System , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[4]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[5]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.

[6]  Markus Jakobsson,et al.  On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.

[7]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[8]  Zhe Xia,et al.  A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission , 2012, Electronic Voting.

[9]  Peter Y. A. Ryan,et al.  Computing Science Pret a Voter with Paillier Encryption Pret a Voter with Paillier Encryption Bibliographical Details Pret a Voter with Paillier Encryption Suggested Keywords Prêtà Voter with Paillier Encryption , 2007 .

[10]  Jacques Stern,et al.  Practical multi-candidate election system , 2001, PODC '01.

[11]  Kim Ramchen Parallel Shuffling and Its Application to Prêt à Voter , 2010, EVT/WOTE.

[12]  Kazue Sako,et al.  An Ecient Scheme for Proving a Shue , 2001 .

[13]  Peter Y. A. Ryan,et al.  Prêt à Voter with Re-encryption Mixes , 2006, ESORICS.

[14]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[15]  Mihir Bellare,et al.  Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..