On the Possibility of Non-interactive E-Voting in the Public-Key Setting
暂无分享,去创建一个
[1] Craig Gentry,et al. Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.
[2] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[3] Marc Fischlin,et al. Adaptive proofs of knowledge in the random oracle model , 2015, IET Inf. Secur..
[4] Adi Shamir,et al. Multiple non-interactive zero knowledge proofs based on a single random string , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[5] Feng Hao,et al. Anonymous voting by two-round public discussion , 2010, IET Inf. Secur..
[6] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[7] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[8] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[9] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[10] Xavier Boyen,et al. The Uber-Assumption Family , 2008, Pairing.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Silvio Micali,et al. Input-Indistinguishable Computation , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[13] Andrew Chi-Chih Yao,et al. Near-optimal time-space tradeoff for element distinctness , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[14] Feng Hao,et al. A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.
[15] Vincenzo Iovino,et al. Secure and Policy-Private Resource Sharing in an Online Social Network , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[16] Vincenzo Iovino,et al. Simulation-Based Secure Functional Encryption in the Random Oracle Model , 2015, LATINCRYPT.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[19] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[20] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[21] Manuel Blum,et al. Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) , 1988, STOC 1988.