Secure Electronic Voting

Overview.- Matsumoto-Imai Cryptosystems.- Oil-Vinegar Signature Schemes.- Hidden Field Equations.- Internal Perturbation.- Triangular Schemes.- Direct Attacks.- Future Research.