A Game-Based Definition of Coercion-Resistance and Its Applications
暂无分享,去创建一个
[1] Senator,et al. The ThreeBallot Voting System , 2006 .
[2] Kevin J. Henry,et al. The Effectiveness of Receipt-Based Attacks on ThreeBallot , 2009, IEEE Transactions on Information Forensics and Security.
[3] Michael Backes,et al. Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[4] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[5] Ran Canetti,et al. Incoercible multiparty computation , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[6] Moni Naor,et al. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy , 2006, CRYPTO.
[7] David Pointcheval,et al. On Some Incompatible Properties of Voting Schemes , 2010, Towards Trustworthy Elections.
[8] Jean-Jacques Quisquater,et al. Simulation-Based Analysis of E2E Voting Systems , 2007, VOTE-ID.
[9] Moni Naor,et al. Split-ballot voting: Everlasting privacy with distributed trust , 2007, TSEC.
[10] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[11] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[12] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Ralf Küsters,et al. Simulation-based security with inexhaustible interactive Turing machines , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[14] Jörn Müller-Quade,et al. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.
[15] R. Rivest. The ThreeBallot Voting System , 2006 .
[16] Ralf Küsters,et al. Proving Coercion-Resistance of Scantegrity II , 2010, ICICS.
[17] Miroslaw Kutylowski,et al. Short Ballot Assumption and Threeballot Voting Protocol , 2008, SOFSEM.
[18] Ralf Küsters,et al. Accountability: definition and relationship to verifiability , 2010, CCS '10.
[19] Wolter Pieters,et al. Receipt-freeness as a special case of anonymity in epistemic logic , 2006 .
[20] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[21] Ralf Küsters,et al. A Game-Based Definition of Coercion-Resistance and Its Applications , 2010, CSF.
[22] Ralf Küsters,et al. An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] Warren D. Smith. Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.
[24] Ryan W. Gardner,et al. Coercion Resistant End-to-end Voting , 2009, Financial Cryptography.
[25] Jeremy Clark,et al. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.
[26] Ran Canetti,et al. Incoercible Multiparty Computation (extended abstract). , 1996, IEEE Annual Symposium on Foundations of Computer Science.
[27] Tatsuaki Okamoto,et al. Receipt-Free Electronic Voting Schemes for Large Scale Elections , 1997, Security Protocols Workshop.
[28] Lee Naish,et al. Coercion-Resistant Tallying for STV Voting , 2008, EVT.
[29] Jörn Müller-Quade,et al. Universally Composable Incoercibility , 2009, IACR Cryptol. ePrint Arch..
[30] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .