Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
暂无分享,去创建一个
[1] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[2] Philip B. Stark,et al. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System , 2012, EVT/WOTE.
[3] Pascal Lafourcade,et al. Survey on Electronic Voting Schemes , 2010 .
[4] Melanie Volkamer,et al. Determine the Resilience of Evaluated Internet Voting Systems , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.
[5] Warren D. Smith. Three Voting Protocols: ThreeBallot, VAV, and Twin , 2007, EVT.
[6] Stefan Weber,et al. A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation , 2006 .
[7] Douglas W. Jones,et al. Broken Ballots: Will Your Vote Count? , 2012 .
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Josh Benaloh,et al. Receipt-Free Secret-Ballot Elections , 1994, STOC 1994.
[10] David Pointcheval,et al. On Some Incompatible Properties of Voting Schemes , 2010, Towards Trustworthy Elections.
[11] David A. Wagner,et al. Cryptographic Voting Protocols: A Systems Perspective , 2005, USENIX Security Symposium.
[12] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[13] Byoungcheon Lee,et al. Experimental Design of Worldwide Internet Voting System using PKI , 2001 .
[14] Jeremy Clark,et al. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes , 2008, EVT.
[15] Peter Y. A. Ryan,et al. Prêt à Voter : a Systems Perspective , 2005 .
[16] Colin Boyd,et al. A New Multiple Key Cipher and an Improved Voting Scheme , 1990, EUROCRYPT.
[17] Bryan Alexander Campbell. The Usability Implications of Long Ballot Content for Paper, Electronic, and Mobile Voting Systems , 2013 .
[18] Michael J. Radwin. An untraceable , universally verifiable voting scheme , 1997 .
[19] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[20] R. Rivest. The ThreeBallot Voting System , 2006 .
[21] Aggelos Kiayias,et al. An Internet Voting System Supporting User Privacy , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[22] Stefan Popoveniuc,et al. An Introduction to PunchScan , 2010, Towards Trustworthy Elections.
[23] Alan T. Sherman,et al. Punchscan: Introduction and System Definition of a High-Integrity Election System , 2006 .
[24] Min-Shiang Hwang,et al. Security Enhancement of Chang-Lee Anonymous E-Voting Scheme , 2012 .
[25] Zuzana Rjašková. Electronic Voting Schemes , 2002 .
[26] Josh Benaloh. Rethinking Voter Coercion: The Realities Imposed by Technology , 2013, EVT/WOTE.
[27] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[28] A. S. Sodiya,et al. A Receipt-free Multi-Authority E-Voting System , 2011 .
[29] Joe McCarthy,et al. Transparency and e-Voting: Democratic vs. Commercial Interests , 2004, Electronic Voting in Europe.
[30] Jeremy Clark,et al. Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting , 2008, IEEE Security & Privacy.
[31] Guoliang Xue,et al. Efficient anonymous message submission , 2012, INFOCOM.
[32] Priyanka Gupta,et al. Prime III: a user centered voting system , 2007, CHI Extended Abstracts.
[33] A. Nakajima,et al. Decentralized voting protocols , 1993, Proceedings ISAD 93: International Symposium on Autonomous Decentralized Systems.
[34] Ralf Küsters,et al. Clash Attacks on the Verifiability of E-Voting Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[35] Matthew K. Franklin,et al. Multi-Autority Secret-Ballot Elections with Linear Work , 1996, EUROCRYPT.
[36] Melanie Volkamer,et al. Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[37] Véronique Cortier,et al. SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions , 2015, 2015 IEEE Symposium on Security and Privacy.
[38] Jeremy Epstein,et al. Electronic Voting , 2007, Computer.
[39] Jacques Traoré,et al. Remote Electronic Voting Can Be Efficient, Verifiable and Coercion-Resistant , 2016, Financial Cryptography Workshops.
[40] Ali Miri,et al. Privacy preserving ID3 using Gini Index over horizontally partitioned data , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[41] Chun-Ta Li,et al. A Verifiable Electronic Voting Scheme over the Internet , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[42] Sorin Iftene,et al. General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting , 2007, ICS@SYNASC.
[43] Byoungcheon Lee,et al. Receipt-free Electronic Voting through Collaboration of Voter and Honest Verifier , 2000 .
[44] Rolf Haenni,et al. A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time , 2011, Financial Cryptography.
[45] Cacm Staff. Seven principles for secure e-voting , 2009 .
[46] Byoungcheon Lee,et al. Providing Receipt-Freeness in Mixnet-Based Voting Protocols , 2003, ICISC.
[47] Feng Hao,et al. A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.
[48] Martin Hirt,et al. Receipt-Free K-out-of-L Voting Based on ElGamal Encryption , 2010, Towards Trustworthy Elections.
[49] Peter Y. A. Ryan,et al. Caveat Coercitor: Coercion-Evidence in Electronic Voting , 2013, 2013 IEEE Symposium on Security and Privacy.
[50] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[51] Véronique Cortier,et al. SoK: Verifiability Notions for E-Voting Protocols , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[52] Aggelos Kiayias,et al. DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles , 2015, CCS.
[53] Georg Fuchsbauer,et al. BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme , 2015, IACR Cryptol. ePrint Arch..
[54] Dan S. Wallach,et al. VoteBox: A Tamper-evident, Verifiable Electronic Voting System , 2008, USENIX Security Symposium.
[55] Dan S. Wallach,et al. Casting Votes in the Auditorium , 2007, EVT.
[56] Josh Benaloh,et al. Simple Verifiable Elections , 2006, EVT.
[57] Panayiotis Tsanakas,et al. From Helios to Zeus , 2013, EVT/WOTE.
[58] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[59] Saikat Basu,et al. UNCOERCIBILITY IN E -VOTING AND E - AUCTIONING MECHANISMS USING DENIABLE ENCRYPTION , 2011 .
[60] Moti Yung,et al. Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.
[61] Karen L. Shanton. Election Administration and Voting Survey: Overview and 2018 Findings [July 9, 2019] , 2019 .
[62] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[63] Cheng-Chi Lee,et al. A New Proxy Electronic Voting Scheme Based on Proxy Signatures , 2012 .
[64] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[65] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[66] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[67] Moni Naor,et al. Split-ballot voting: Everlasting privacy with distributed trust , 2007, TSEC.
[68] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[69] Juan E. Gilbert,et al. Prime III: an innovative electronic voting interface , 2009, IUI.
[70] Feng Li,et al. Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[71] Joseph K. Liu,et al. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability , 2008, NDSS.
[72] Jörn Müller-Quade,et al. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.
[73] Byoungcheon Lee,et al. An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness , 2004, TrustBus.
[74] Diego A. López García,et al. A flexible e-voting scheme for debate tools , 2016, Comput. Secur..
[75] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[76] Jacques Stern,et al. Practical multi-candidate election system , 2001, PODC '01.
[77] Melanie Volkamer,et al. Electronic voting with fully distributed trust and maximized flexibility regarding ballot design , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).
[78] Jean-Jacques Quisquater,et al. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.
[79] Tatsuaki Okamoto,et al. Receipt-Free Electronic Voting Schemes for Large Scale Elections , 1997, Security Protocols Workshop.
[80] Jeremy Clark,et al. Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance , 2011, Financial Cryptography.
[81] Melanie Volkamer,et al. Robust electronic voting: Introducing robustness in Civitas , 2011, 2011 International Workshop on Requirements Engineering for Electronic Voting Systems.
[82] Kefei Chen,et al. Receipt-Freeness for Groth e-Voting Schemes , 2009, J. Inf. Sci. Eng..
[83] David Chaum,et al. Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA , 1988, EUROCRYPT.
[84] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[85] Atsushi Fujioka,et al. An Improvement on a Practical Secret Voting Scheme , 1999, ISW.
[86] David Chaum,et al. A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.