메뉴 건너뛰기




Volumn 25, Issue 2, 2002, Pages 93-107

An unlinkably divisible and intention attachable ticket scheme for runoff elections

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; NETWORK PROTOCOLS; SECURITY OF DATA; THEOREM PROVING; VOTING MACHINES;

EID: 0036555079     PISSN: 10848045     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1084-8045(02)90132-3     Document Type: Article
Times cited : (4)

References (22)
  • 3
    • 84948962858 scopus 로고
    • Blind signatures based on the discrete logarithm problem
    • Advances in Cryptology-EUROCRYPT'94, Springer-Verlag
    • J. Camenisch, J. Piveteau and M. Stadler 1995. Blind signatures based on the discrete logarithm problem. Advances in Cryptology-EUROCRYPT'94, LNCS 950, Springer-Verlag, 428-432.
    • (1995) LNCS , vol.950 , pp. 428-432
    • Camenisch, J.1    Piveteau, J.2    Stadler, M.3
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 6
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Springer-Verlag
    • D. Chaum 1983. Blind signatures for untraceable payments. Advances in Cryptology-CRYPTO'82, Springer-Verlag, 199-203.
    • (1983) Advances in Cryptology-CRYPTO'82 , pp. 199-203
    • Chaum, D.1
  • 7
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 8
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • A. Evans, W. Kantrowitz and E. Weiss 1974. A user authentication scheme not requiring secrecy in the computer. Communications of the ACM 17(8), 437-442.
    • (1974) Communications of the ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans, A.1    Kantrowitz, W.2    Weiss, E.3
  • 9
    • 0032021944 scopus 로고    scopus 로고
    • User efficient blind signatures
    • C. Fan & C. Lei 1998. User efficient blind signatures. Electronics Letters 34(6), 544-546.
    • (1998) Electronics Letters , vol.34 , Issue.6 , pp. 544-546
    • Fan, C.1    Lei, C.2
  • 10
    • 0011119853 scopus 로고    scopus 로고
    • An efficient blind signature scheme for information hiding
    • C. Fan and W. Chen 2001. An efficient blind signature scheme for information hiding. International Journal of Electronic Commerce 6(1), 93-100.
    • (2001) International Journal of Electronic Commerce , vol.6 , Issue.1 , pp. 93-100
    • Fan, C.1    Chen, W.2
  • 12
    • 84890873195 scopus 로고
    • Single term off-line coins
    • Advances in Cryptology-EUROCRYPT'93, Springer-Verlag
    • N. Ferguson 1994. Single term off-line coins. Advances in Cryptology-EUROCRYPT'93, LNCS 765, Springer-Verlag, 318-328.
    • (1994) LNCS , vol.765 , pp. 318-328
    • Ferguson, N.1
  • 15
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Advances in Cryptology-CRYPTO'92, Springer-Verlag
    • T. Okamoto 1992. Provably secure and practical identification schemes and corresponding signature schemes. Advances in Cryptology-CRYPTO'92, LNCS 740, Springer-Verlag, 31-53.
    • (1992) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 16
    • 84955579666 scopus 로고    scopus 로고
    • Provably secure blind signature schemes
    • Advances in Cryptology-ASIACRYPT'96, Springer-Verlag
    • D. Pointcheval & J. Stern 1996. Provably secure blind signature schemes. Advances in Cryptology-ASIACRYPT'96, LNCS 1163, Springer-Verlag, 252-265.
    • (1996) LNCS , vol.1163 , pp. 252-265
    • Pointcheval, D.1    Stern, J.2
  • 18
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • G. Purdy 1974. A high security log-in procedure. Communications of the ACM 17(8), 442-445.
    • (1974) Communications of the ACM , vol.17 , Issue.8 , pp. 442-445
    • Purdy, G.1
  • 21
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Advances in Cryptology-CRYPTO'89, Springer-Verlag
    • C. Schnorr 1990. Efficient identification and signatures for smart cards. Advances in Cryptology-CRYPTO'89, LNCS 435, Springer-Verlag, 235-251.
    • (1990) LNCS , vol.435 , pp. 235-251
    • Schnorr, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.