Post-Quantum Anonymous Veto Networks
暂无分享,去创建一个
[1] Ralf Küsters,et al. Ordinos: A Verifiable Tally-Hiding E-Voting System , 2020, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Gregory Neven,et al. Practical Quantum-Safe Voting from Lattices , 2017, IACR Cryptol. ePrint Arch..
[3] Aggelos Kiayias,et al. Self-tallying Elections and Perfect Ballot Secrecy , 2002, Public Key Cryptography.
[4] Feng Hao,et al. A 2-Round Anonymous Veto Protocol , 2009, Security Protocols Workshop.
[5] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[6] Ari Juels,et al. Dining Cryptographers Revisited , 2004, EUROCRYPT.
[7] Jens Groth,et al. Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast , 2004, Financial Cryptography.
[8] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[9] Rafail Ostrovsky,et al. Non-interactive and non-malleable commitment , 1998, STOC '98.
[10] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[11] Xavier Boyen,et al. A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing , 2020, IACR Cryptol. ePrint Arch..
[12] Noah Stephens-Davidowitz,et al. Discrete Gaussian Sampling Reduces to CVP and SVP , 2015, SODA.
[13] Tsuyoshi Takagi,et al. One Sample Ring-LWE with Rounding and Its Application to Key Exchange , 2019, ACNS.
[14] Véronique Cortier,et al. SoK: Verifiability Notions for E-Voting Protocols , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[15] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[16] Feng Hao,et al. PriVeto: a fully private two-round veto protocol , 2019, IET Inf. Secur..
[17] Chris Peikert,et al. An Efficient and Parallel Gaussian Sampler for Lattices , 2010, CRYPTO.
[18] Ivan Damgård,et al. More Efficient Commitments from Structured Lattice Assumptions , 2018, SCN.
[19] Véronique Cortier,et al. SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions , 2015, 2015 IEEE Symposium on Security and Privacy.
[20] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..