How to Vote Privately Using Bitcoin
暂无分享,去创建一个
[1] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[2] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[3] Florian Kerschbaum,et al. Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently , 2013, IACR Cryptol. ePrint Arch..
[4] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[5] Yehuda Lindell,et al. Highly-Efficient Universally-Composable Commitments based on the DDH Assumption , 2011, IACR Cryptol. ePrint Arch..
[6] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[7] Marcin Andrychowicz,et al. How to deal with malleability of BitCoin transactions , 2013, ArXiv.
[8] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[9] Iddo Bentov,et al. How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.
[10] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Ivan Damgård,et al. Commitment Schemes and Zero-Knowledge Protocols , 1998, Lectures on Data Security.
[12] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[13] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[14] Nir Bitansky,et al. Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs , 2013, TCC.
[15] A. Narayanan,et al. Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme , 2015 .
[16] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[17] Feng Li,et al. Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[18] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[19] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.