Election Verifiability for Helios under Weaker Trust Assumptions
暂无分享,去创建一个
Véronique Cortier | Malika Izabachène | David Galindo | Stéphane Glondu | V. Cortier | D. Galindo | Malika Izabachène | Stéphane Glondu
[1] Martijn Stam,et al. Understanding Adaptivity: Random Systems Revisited , 2012, ASIACRYPT.
[2] Jean-Jacques Quisquater,et al. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.
[3] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols , 2010, Information Security and Cryptography.
[4] Ben Smyth,et al. Adapting Helios for Provable Ballot Privacy , 2011, ESORICS.
[5] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[6] Jeremy Epstein,et al. Electronic Voting , 2007, Computer.
[7] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[8] Ben Smyth,et al. Attacking and fixing Helios: An analysis of ballot secrecy , 2013, J. Comput. Secur..
[9] Ralf Küsters,et al. Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study , 2011, 2011 IEEE Symposium on Security and Privacy.
[10] Ralf Küsters,et al. Clash Attacks on the Verifiability of E-Voting Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[11] Josh Benaloh,et al. Ballot Casting Assurance via Voter-Initiated Poll Station Auditing , 2007, EVT.
[12] Jens Groth. Evaluating Security of Voting Schemes in the Universal Composability Framework , 2004, ACNS.
[13] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[14] Ben Smyth,et al. Attacking and Fixing Helios: An Analysis of Ballot Secrecy , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[15] Graham Steel,et al. A Formal Analysis of Authentication in the TPM , 2010, Formal Aspects in Security and Trust.
[16] Markus Jakobsson,et al. Towards Trustworthy Elections, New Directions in Electronic Voting , 2010, Towards Trustworthy Elections.
[17] Bogdan Warinschi,et al. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios , 2012, ASIACRYPT.
[18] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[19] Véronique Cortier,et al. Distributed ElGamal à la Pedersen: Application to Helios , 2013, WPES.
[20] Tiphaine Pinault,et al. E-voting at Expatriates' MPs Elections in France , 2012, Electronic Voting.
[21] Joos Vandewalle,et al. Advances in Cryptology - CRYPTO 1994 , 1994 .
[22] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[23] Ralf Küsters,et al. Accountability: definition and relationship to verifiability , 2010, CCS '10.
[24] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[25] Jan Jürjens,et al. Verifying Cryptographic Code in C: Some Experience and the Csec Challenge , 2011, Formal Aspects in Security and Trust.
[26] Vijay Atluri,et al. Computer Security – ESORICS 2011 , 2011, Lecture Notes in Computer Science.
[27] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[28] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[29] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.