Publicly auditable conditional blind signatures
暂无分享,去创建一个
Aris Pagourtzis | Bingsheng Zhang | Panagiotis Grontas | Alexandros Zacharakis | Aris Pagourtzis | Bingsheng Zhang | Alexandros Zacharakis | Panagiotis M. Grontas
[1] David Chaum,et al. Designated Confirmer Signatures , 1994, EUROCRYPT.
[2] Jacques Traoré,et al. Towards Practical and Secure Coercion-Resistant Electronic Elections , 2010, CANS.
[3] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[4] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[5] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[6] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[7] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[8] Rafail Ostrovsky,et al. Security of Blind Digital Signatures (Extended Abstract) , 1997, CRYPTO.
[9] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[10] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[11] Dominique Unruh,et al. Security of Blind Signatures Revisited , 2012, Public Key Cryptography.
[12] Steven Myers,et al. ANONIZE: A Large-Scale Anonymous Survey System , 2014, 2014 IEEE Symposium on Security and Privacy.
[13] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[14] Jeremy Clark,et al. Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance , 2011, Financial Cryptography.
[15] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[16] Tatsuaki Okamoto,et al. Provably Secure Partially Blind Signatures , 2000, CRYPTO.
[17] Yi Mu,et al. Designated Verifier Signature: Definition, Framework and New Constructions , 2007, UIC.
[18] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[19] Ralf Küsters,et al. Clash Attacks on the Verifiability of E-Voting Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[20] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[21] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[22] Aris Pagourtzis,et al. Towards everlasting privacy and efficient coercion resistance in remote electronic voting , 2018, IACR Cryptol. ePrint Arch..
[23] Aris Pagourtzis,et al. Coercion Resistance in a Practical Secret Voting Scheme for Large Scale Elections , 2017, 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC).
[24] Jens Groth,et al. Non-interactive Zero-Knowledge Arguments for Voting , 2005, ACNS.
[25] Rolf Haenni,et al. Efficient Vote Authorization in Coercion-Resistant Internet Voting , 2011, VoteID.
[26] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[27] Rolf Haenni,et al. A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time , 2011, Financial Cryptography.
[28] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[29] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[30] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[31] Claus-Peter Schnorr,et al. Security of Blind Discrete Log Signatures against Interactive Attacks , 2001, ICICS.
[32] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[33] Holger Petersen,et al. How to Convert any Digital Signature Scheme into a Group Signature Scheme , 1997, Security Protocols Workshop.