Verifiability and Other Technical Requirements for Online Voting Systems
暂无分享,去创建一个
[1] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[2] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[3] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[4] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[5] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, EUROCRYPT.
[6] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.
[7] F. Meade. A Guide to Understanding Audit in Trusted Systems , 1988 .
[8] Alexander Prosser,et al. Electronic voting: algorithmic and implementation issues , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[9] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.