-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668-1680, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
2
-
-
0028087488
-
Receipt-free secret-ballot elections
-
J. Benaloh and D. Tuinstra. Receipt-free secret-ballot elections. In STOC '94, pages 544-553, 1994.
-
(1994)
STOC '94
, pp. 544-553
-
-
Benaloh, J.1
Tuinstra, D.2
-
3
-
-
24744445833
-
A simplified version of the Chaum voting scheme
-
University of Newcastle
-
J. W. Bryans and P. Y. A. Ryan. A simplified version of the Chaum voting scheme. Technical Report CS-TR 843, University of Newcastle, 2004.
-
(2004)
Technical Report
, vol.CS-TR 843
-
-
Bryans, J.W.1
Ryan, P.Y.A.2
-
4
-
-
0030416397
-
Incoercible multiparty computation
-
R. Canetti and R. Gennaro. Incoercible multiparty computation. In FOCS '96, pages 504-513, 1996.
-
(1996)
FOCS '96
, pp. 504-513
-
-
Canetti, R.1
Gennaro, R.2
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
0003062028
-
Blind signature systems
-
D. Chaum. Blind signature systems. In CRYPTO '83, page 153, 1983.
-
(1983)
CRYPTO '83
, pp. 153
-
-
Chaum, D.1
-
7
-
-
2342617507
-
E-voting: Secret-ballot receipts: True voter-verifiable elections
-
Jan./Feb.
-
D. Chaum. E-voting: Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, 2(1):38-47, Jan./Feb. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 38-47
-
-
Chaum, D.1
-
8
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme
-
J. D. Cohen(Benaloh) and M. J. Fischer. A robust and verifiable cryptographically secure election scheme. In FOCS '85, pages 372-382, 1985.
-
(1985)
FOCS '85
, pp. 372-382
-
-
Cohen, J.D.1
Fischer, M.J.2
-
9
-
-
77951106449
-
Multi-authority secret-ballot elections with linear work
-
R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung. Multi-authority secret-ballot elections with linear work. In EUROCRYPT '96, pages 72-83, 1996.
-
(1996)
EUROCRYPT '96
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yung, M.4
-
10
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Eurocrypt '97, pages 103-118, 1997.
-
(1997)
Eurocrypt '97
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
11
-
-
77954124943
-
A practical secret voting scheme for large scale elections
-
AUSCRYPT '92
-
A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In AUSCRYPT '92, volume 718 of LNCS, pages 244-251, 1993.
-
(1993)
LNCS
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
12
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
Eurocrypt 2000
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In Eurocrypt 2000, volume 1807 of LNCS, pages 539+, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 539
-
-
Hirt, M.1
Sako, K.2
-
13
-
-
33749009810
-
Coercion-resistant electronic elections
-
A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant electronic elections. In WPES '05, pages 61-70, 2005.
-
(2005)
WPES '05
, pp. 61-70
-
-
Juels, A.1
Catalano, D.2
Jakobsson, M.3
-
14
-
-
85077591735
-
Cryptographic voting protocols: A systems perspective
-
C. Karlof, N. Sastry, and D. Wagner. Cryptographic voting protocols: A systems perspective. In USENIX Security '05, pages 33-50, 2005.
-
(2005)
USENIX Security '05
, pp. 33-50
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
15
-
-
84926193517
-
Visual cryptography
-
Eurocrypt '94
-
M. Naor and A. Shamir. Visual cryptography. In Eurocrypt '94, volume 950 of LNCS, pages 1-12, 1995.
-
(1995)
LNCS
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
17
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
CRYPTO '91
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, volume 576 of LNCS, pages 129-140, 1991.
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
18
-
-
84941151258
-
A method for electronic voting with coercion-free receipt
-
D. J. Reynolds. A method for electronic voting with coercion-free receipt. FEE '05. Presentation: http://www.win.tue.nl/~berry/fee2005/ presentations/reynolds.ppt.
-
FEE '05
-
-
Reynolds, D.J.1
-
19
-
-
33749569117
-
A variant of the Chaum voter-verifiable scheme
-
P. Y. A. Ryan. A variant of the Chaum voter-verifiable scheme. In WITS '05, pages 81-88, 2005.
-
(2005)
WITS '05
, pp. 81-88
-
-
Ryan, P.Y.A.1
-
20
-
-
84957356080
-
Receipt-free mix-type voting schemes
-
EUROCRYPT '95
-
K. Sako and J. Kilian. Receipt-free mix-type voting schemes. In EUROCRYPT '95, volume 921 of LNCS, pages 393-403, 1995.
-
(1995)
LNCS
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
21
-
-
84941157453
-
Cryptographers panel
-
A. Shamir. Cryptographers panel. RSA conference, 2006. Webcast: http://media.omediaweb.com/rsa2006/1_5/1_5_High.asx.
-
(2006)
RSA Conference
-
-
Shamir, A.1
|