A Correct, Private, and Efficient Mix Network
暂无分享,去创建一个
Ed Dawson | Colin Boyd | Kun Peng | Kapalee Viswanathan | E. Dawson | C. Boyd | Kun Peng | Kapaleeswaran Viswanathan
[1] Jean-Jacques Quisquater,et al. Advances in Cryptology — EUROCRYPT ’95 , 2001, Lecture Notes in Computer Science.
[2] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[3] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[4] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[5] Kazue Sako,et al. An Efficient Scheme for Proving a Shuffle , 2001, CRYPTO.
[6] Kaoru Kurosawa,et al. Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.
[7] Markus Jakobsson,et al. Optimistic Mixing for Exit-Polls , 2002, ASIACRYPT.
[8] Kazue Sako,et al. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth , 1995, EUROCRYPT.
[9] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[10] Colin Boyd,et al. Attacking and Repairing Batch Verification Schemes , 2000, ASIACRYPT.
[11] Masayuki Abe,et al. Lenient/Strict Batch Verification in Several Groups , 2001, ISC.
[12] Kazue Sako,et al. An Ecient Scheme for Proving a Shue , 2001 .
[13] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[14] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[15] Mihir Bellare,et al. Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..
[16] Ed Dawson,et al. A Three Phased Schema for Sealed Bid Auction System Design , 2000, ACISP.
[17] Markus Jakobsson,et al. An optimally robust hybrid mix network , 2001, PODC '01.
[18] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[19] Dan Boneh,et al. Almost entirely correct mixing with applications to voting , 2002, CCS '02.
[20] Masayuki Abe,et al. Remarks on Mix-Network Based on Permutation Networks , 2001, Public Key Cryptography.
[21] Masayuki Abe,et al. Mix-Networks on Permutation Networks , 1999, ASIACRYPT.
[22] Masayuki Abe,et al. A Length-Invariant Hybrid Mix , 2000, ASIACRYPT.
[23] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[24] Walter M. Lioen,et al. Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.
[25] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[26] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[27] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[28] Kazue Sako,et al. Fault tolerant anonymous channel , 1997, ICICS.
[29] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[30] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.