Minimal assumptions to achieve privacy in e-voting protocols
暂无分享,去创建一个
[1] David Pointcheval,et al. On Some Incompatible Properties of Voting Schemes , 2010, Towards Trustworthy Elections.
[2] Radha Poovendran,et al. A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..
[3] Octavian Catrina,et al. Fostering the Uptake of Secure Multiparty Computation in E-Commerce , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[4] Warren D. Smith. Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.
[5] Markus Jakobsson,et al. Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.
[6] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.
[9] Moni Naor,et al. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy , 2006, CRYPTO.
[10] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[11] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[12] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[13] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[14] Moni Naor,et al. Split-ballot voting: Everlasting privacy with distributed trust , 2010, ACM Trans. Inf. Syst. Secur..
[15] Ronald L. Rivest,et al. Scratch & vote: self-contained paper-based cryptographic voting , 2006, WPES '06.
[16] Wolter Pieters,et al. Anonymity and Verifiability in Voting: Understanding (Un)Linkability , 2010, ICICS.