메뉴 건너뛰기




Volumn 8, Issue 5, 1997, Pages 481-490

A Secure and Optimally Efficient Multi-Authority Election Scheme

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; MATHEMATICAL MODELS;

EID: 0031221506     PISSN: 1124318X     EISSN: None     Source Type: Journal    
DOI: 10.1002/ett.4460080506     Document Type: Article
Times cited : (170)

References (38)
  • 3
    • 0003945449 scopus 로고
    • PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September
    • J. Benaloh: Verifiable secret-ballot elections. PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September 1987.
    • (1987) Verifiable Secret-ballot Elections
    • Benaloh, J.1
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, Vol. 24, No. 2, 1981, p. 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 6
    • 84957356080 scopus 로고
    • Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth
    • Berlin. Springer-Verlag
    • K. Sako, J. Kilian: Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth. In Advances in Cryptology-EUROCRYPT '95, Vol. 921 of Lecture Notes in Computer Science, Berlin. Springer-Verlag, 1995, p. 393-403.
    • (1995) Advances in Cryptology-EUROCRYPT '95, Vol. 921 of Lecture Notes in Computer Science , vol.921 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 15
    • 0042458192 scopus 로고
    • Secure agreement protocols: Reliable and atomic group multicast in Rampart
    • Fairfax, November
    • M. Reiter: Secure agreement protocols: Reliable and atomic group multicast in Rampart. 2-nd ACM Conference on Computer and Communications Security, Fairfax, November 1994.
    • (1994) 2-nd ACM Conference on Computer and Communications Security
    • Reiter, M.1
  • 18
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal: A public-key cryptosystem and a signature scheme based on discrete logarithms. "IEEE Transactions on Information Theory", Vol. IT-31, No. 4, 1985, p. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir: How to share a secret. "Communications of the ACM", Vol. 22, No. 11, 1979, p. 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 23
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. P. Schnorr: Efficient signature generation by smart cards. "Journal of Cryptology", Vol. 4, No. 3, 1991, p. 161-174.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 24
    • 0020829007 scopus 로고
    • Transaction protection by beacons
    • M. Rabin: Transaction protection by beacons. "Journal of Computer and System Sciences", Vol. 27, No. 2, 1983, p. 256-267.
    • (1983) Journal of Computer and System Sciences , vol.27 , Issue.2 , pp. 256-267
    • Rabin, M.1
  • 25
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • New York, Springer-Verlag
    • A. Fiat, A. Shamir: How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology-CRYPTO '86 of Lecture Notes in Computer Science, New York, Springer-Verlag, Vol. 263, 1987, p. 186-194.
    • (1987) Advances in Cryptology-CRYPTO '86 of Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 31
    • 0000931680 scopus 로고
    • Algorithms in number theory
    • J. van Leeuwen, editor, Elsevier Science Publishers B.V., Amsterdam
    • A. K. Lenstra, H. W. Lenstra: Jr. Algorithms in number theory. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, p. 673-715. Elsevier Science Publishers B.V., Amsterdam, 1990.
    • (1990) Handbook of Theoretical Computer Science , pp. 673-715
    • Lenstra, A.K.1    Lenstra H.W., Jr.2
  • 38
    • 84955592437 scopus 로고    scopus 로고
    • Some remarks on a receipt-free and universally verifiable mix-type voting scheme
    • Berlin, Springer-Verlag
    • M. Michels, P. Horster: Some remarks on a receipt-free and universally verifiable mix-type voting scheme. In Advances in Cryptology-ASIACRYPT '94 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 1163, 1996, p. 125-132.
    • (1996) Advances in Cryptology-ASIACRYPT '94 of Lecture Notes in Computer Science , vol.1163 , pp. 125-132
    • Michels, M.1    Horster, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.