A Distributed Polling with Probabilistic Privacy
暂无分享,去创建一个
Rachid Guerraoui | Mohammed Erradi | Yahya Benkaouz | Florian Huc | R. Guerraoui | Y. Benkaouz | M. Erradi | Florian Huc | Yahya Benkaouz
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[3] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[6] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[7] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[8] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[9] Kaoru Kurosawa,et al. Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.
[10] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[13] I. Damgård,et al. A Generalisation, a Simplification and some Applications of Paillier’s Probabilistic Public-Key System , 2000 .
[14] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[15] Dahlia Malkhi,et al. Anonymity without 'Cryptography' , 2002, Financial Cryptography.
[16] Jacques Stern,et al. Practical multi-candidate election system , 2001, PODC '01.
[17] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[18] Dahlia Malkhi,et al. E-Voting Without 'Cryptography' , 2002, Financial Cryptography.
[19] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[20] Igor Nai Fovino,et al. A Protocol for Anonymous and Accurate E-Polling , 2005, TCGOV.
[21] Kun Peng,et al. A Design of Secure Preferential E-Voting , 2009, VoteID.
[22] Ivan Damgård,et al. A generalization of Paillier’s public-key system with applications to electronic voting , 2010, International Journal of Information Security.
[23] Anne-Marie Kermarrec,et al. Decentralized polling with respectable participants , 2009, J. Parallel Distributed Comput..
[24] Ting Wang,et al. Design and Analysis for Private Determination Protocol of Segment-Circle Position Relation , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.