메뉴 건너뛰기




Volumn , Issue , 2005, Pages 68-80

Applications of secure electronic voting to automated privacy-preserving troubleshooting

Author keywords

Automatic Troubleshooting; Homomorphic Encryption; Integrity; Privacy; Zero Knowledge Proof

Indexed keywords

DATA PROCESSING; DISTRIBUTED DATABASE SYSTEMS; PERSONAL COMPUTERS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33745790656     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102132     Document Type: Conference Paper
Times cited : (15)

References (28)
  • 4
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addesses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addesses, and digital pseudonyms. Communications of the ACM, 24(2), pp. 84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 10
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • LNCS
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology - Crypto '94, LNCS 839, pp. 174-187, 1994.
    • (1994) Advances in Cryptology - Crypto '94 , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 11
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • LNCS
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - Crypto '86, LNCS 283, pp. 186-194, 1987.
    • (1987) Advances in Cryptology - Crypto '86 , vol.283 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 12
    • 36048992623 scopus 로고    scopus 로고
    • Introducing tarzan, a peer-to-peer anonymizing network layer
    • M. J. Freedman, E. Sit, J. Gates, and R. Morris. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. In IPTPS, 2002.
    • (2002) IPTPS
    • Freedman, M.J.1    Sit, E.2    Gates, J.3    Morris, R.4
  • 13
    • 0001292443 scopus 로고
    • A practical secret voting scheme for large scale elections
    • Dec.
    • T. Fujioka, T. Okamoto, and K. Ohta. A Practical Secret Voting Scheme for Large Scale Elections. In Proceedings of Auscrypt, Dec. 1992.
    • (1992) Proceedings of Auscrypt
    • Fujioka, T.1    Okamoto, T.2    Ohta, K.3
  • 14
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Feb
    • D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion Routing for Anonymous and Private Internet Connections. In CACM, Feb 1999.
    • (1999) CACM
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 15
    • 33745775934 scopus 로고    scopus 로고
    • Privacy-preserving friends troubleshooting network
    • San Diego, CA.
    • Q. Huang, H. J. Wang, and N. Borisov. Privacy-Preserving Friends Troubleshooting Network. ISOC NDSS 2005, San Diego, CA.
    • ISOC NDSS 2005
    • Huang, Q.1    Wang, H.J.2    Borisov, N.3
  • 17
    • 84945135059 scopus 로고    scopus 로고
    • Cryptographic counters and applications to electronic voting
    • LNCS
    • J. Katz, S. Myers, and R. Ostrovsky. Cryptographic Counters and Applications to Electronic Voting. In Advances in Cryptology -Eurocrypt 2001, LNCS 2045, pp. 78-92, 2001.
    • (2001) Advances in Cryptology -Eurocrypt 2001 , vol.2045 , pp. 78-92
    • Katz, J.1    Myers, S.2    Ostrovsky, R.3
  • 19
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz. Elliptic curve cryptosystems. Math. Comp. 48 (1987), pp. 203-209.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 20
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. Lenstra and E. Verheul. Selecting Cryptographic Key Sizes. J. Cryptology 14 (2001), no. 4, pp. 255-293.
    • (2001) J. Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2
  • 21
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • LNCS
    • T. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology - Eurocrypt '91, LNCS 547, pp. 522-526, 1991.
    • (1991) Advances in Cryptology - Eurocrypt '91 , vol.547 , pp. 522-526
    • Pedersen, T.1
  • 24
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. ACM 22 (1979), no. 11, pp. 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 25
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon. A Mathematical Theory Of Communication. Bell System Tech. J. 27 (1948), pp. 379-423, 623-656.
    • (1948) Bell System Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.