메뉴 건너뛰기




Volumn , Issue , 2005, Pages 207-218

Unconditional privacy in social choice

Author keywords

[No Author keywords available]

Indexed keywords

REPUTATION EFFECTS; SOCIAL CHOICE; SOCIAL WELFARE FUNCTIONAL (SWF);

EID: 32144458249     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 1
    • 0003917730 scopus 로고
    • [Arrow, 1963] New Haven: Cowles Foundation, 2nd edition, 1963. 1st edition
    • [Arrow, 1963] K. Arrow. Social choice and individual values. New Haven: Cowles Foundation, 2nd edition, 1963. 1st edition 1951.
    • (1951) Social Choice and Individual Values
    • Arrow, K.1
  • 2
    • 0000733155 scopus 로고
    • The computational difficulty of manipulating an election
    • [Bartholdi, III et al., 1989a]
    • [Bartholdi, III et al., 1989a] J. Bartholdi, III, C. A. Tovey, and M. A. Trick. The computational difficulty of manipulating an election. Social Choice and Welfare, 6(3):227-241, 1989.
    • (1989) Social Choice and Welfare , vol.6 , Issue.3 , pp. 227-241
    • Bartholdi III, J.1    Tovey, C.A.2    Trick, M.A.3
  • 3
    • 0012257673 scopus 로고
    • Voting schemes for which it can be difficult to tell who won the election
    • [Bartholdi, III et al., 1989b]
    • [Bartholdi, III et al., 1989b] J. Bartholdi, III, C. A. Tovey, and M. A. Trick. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare, 6(3):157-165, 1989.
    • (1989) Social Choice and Welfare , vol.6 , Issue.3 , pp. 157-165
    • Bartholdi III, J.1    Tovey, C.A.2    Trick, M.A.3
  • 5
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • [Benaloh, 1987] Advances in Cryptology - Proceedings of the 13th Annual International Cryptology Conference (CRYPTO), Springer
    • [Benaloh, 1987] J. Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret. In Advances in Cryptology - Proceedings of the 13th Annual International Cryptology Conference (CRYPTO), volume 263 of Lecture Notes in Computer Science (LNCS), pages 251-260. Springer, 1987.
    • (1987) Lecture Notes in Computer Science (LNCS) , vol.263 , pp. 251-260
    • Benaloh, J.1
  • 9
    • 85034632918 scopus 로고
    • Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
    • [Chaum, 1988] Proceedings of the 5th Eurocrypt Conference, Springer
    • [Chaum, 1988] D. Chaum. Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In Proceedings of the 5th Eurocrypt Conference, volume 330 of Lecture Notes in Computer Science (LNCS), pages 177-182. Springer, 1988.
    • (1988) Lecture Notes in Computer Science (LNCS) , vol.330 , pp. 177-182
    • Chaum, D.1
  • 11
    • 0028675686 scopus 로고
    • On the structure of the privacy hierarchy
    • [Chor et al., 1994]
    • [Chor et al., 1994] B. Chor, M. Geréb-Graus, and E. Kushilevitz. On the structure of the privacy hierarchy. Journal of Cryptology, 7(1):53-60, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 53-60
    • Chor, B.1    Geréb-Graus, M.2    Kushilevitz, E.3
  • 13
    • 0017018484 scopus 로고
    • New directions in cryptography
    • [Diffie and Hellman, 1976]
    • [Diffie and Hellman, 1976] W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, 1976.
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 14
    • 0001195563 scopus 로고
    • Manipulation of voting schemes
    • [Gibbard, 1973]
    • [Gibbard, 1973] A. Gibbard. Manipulation of voting schemes. Econometrica, 41:587-602, 1973.
    • (1973) Econometrica , vol.41 , pp. 587-602
    • Gibbard, A.1
  • 16
    • 0031269788 scopus 로고    scopus 로고
    • Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP
    • [Hemaspaandra et al., 1997]
    • [Hemaspaandra et al., 1997] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP. Journal of the ACM, 44(6):806-825, 1997.
    • (1997) Journal of the ACM , vol.44 , Issue.6 , pp. 806-825
    • Hemaspaandra, E.1    Hemaspaandra, L.2    Rothe, J.3
  • 19
    • 0041492960 scopus 로고    scopus 로고
    • Exact complexity of the winner problem for Young elections
    • [Rothe et al., 2003]
    • [Rothe et al., 2003] J. Rothe, H. Spakowski, and J. Vogel. Exact complexity of the winner problem for Young elections. Theory of Computing Systems, 36(4):375-386, 2003.
    • (2003) Theory of Computing Systems , vol.36 , Issue.4 , pp. 375-386
    • Rothe, J.1    Spakowski, H.2    Vogel, J.3
  • 20
    • 49549141769 scopus 로고
    • Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions
    • [Satterthwaite, 1975]
    • [Satterthwaite, 1975] M. A. Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory, 10:187-217, 1975.
    • (1975) Journal of Economic Theory , vol.10 , pp. 187-217
    • Satterthwaite, M.A.1
  • 22
    • 0000381950 scopus 로고
    • A consistent extension of Condorcet's election principle
    • [Young and Levenglick, 1978]
    • [Young and Levenglick, 1978] H. Young and A. Levenglick. A consistent extension of Condorcet's election principle. SIAM Journal on Applied Mathematics, 35(2):285-300, 1978.
    • (1978) SIAM Journal on Applied Mathematics , vol.35 , Issue.2 , pp. 285-300
    • Young, H.1    Levenglick, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.