메뉴 건너뛰기




Volumn 168, Issue SPEC. ISS., 2007, Pages 5-28

Data Anonymity in the FOO Voting Scheme

Author keywords

anonymity and privacy; attribution set; data anonymity; e voting; formal methods for security protocols

Indexed keywords

DATA REDUCTION; ELECTRONIC DATA INTERCHANGE; NETWORK PROTOCOLS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33846571461     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.11.001     Document Type: Article
Times cited : (22)

References (52)
  • 1
    • 17644411480 scopus 로고    scopus 로고
    • Abadi, M. and C. Fournet, Mobile values, new names, and secure communication, in: Proc. POPL '01 (2001), pp. 104-115
  • 3
    • 33846629619 scopus 로고    scopus 로고
    • Adithia, M., "Probabilistic Analysis of Network Anonymity using PRISM," Master's thesis, Eindhoven University of Technology (2006)
  • 6
    • 0028087488 scopus 로고    scopus 로고
    • Benaloh, J. and D. Tuinstra, Receipt-free secret-ballot elections (extended abstract), in: Proc. STOC '94, Montreal (1994), pp. 544-553
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • Blanchet, B., An efficient cryptographic protocol verifier based on Prolog rules., in: 14th Computer Security Foundations Workshop, Cape Breton, Nova Scotia (2001), pp. 82-96
  • 9
    • 26844508455 scopus 로고    scopus 로고
    • Blanchet, B., M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols., in: 20th IEEE Symposium on Logic in Computer Science, Chicago (2005), pp. 331-340
  • 10
    • 84942246406 scopus 로고    scopus 로고
    • Bodei, C., M. Buchholtz, P. Degano, F. Nielson and H. Nielson, Automatic validation of protocol narration, in: Proc. CSFW 2003, Pacific Grove (2003), pp. 126-140
  • 11
    • 33846588528 scopus 로고    scopus 로고
    • Boyd, C., A new multiple key cipher and an improved voting scheme, in: Proc. Eurocrypt '89 (1989), pp. 617-625
  • 12
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84-88
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 13
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28 (1985) 1030-1044
    • (1985) Communications of the ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 14
    • 85034632918 scopus 로고    scopus 로고
    • Chaum, D., Elections with unconditionally secret ballots and disruption equivalent to breaking rsa, in: Proc. Eurocrypt '88 (1988), pp. 177-182
  • 15
    • 85024290278 scopus 로고    scopus 로고
    • Chaum, D. and E. van Heyst, Group signatures, in: D. Davies, editor, Proc. EUROCRYPT '91 (1991), pp. 257-265
  • 17
    • 77951106449 scopus 로고    scopus 로고
    • Cramer, R., M. Franklin, B. Schoenmakers and M. Yung, Multi-autority secret-ballot elections with linear work., in: U. Maurer, editor, Proc. Eurocrypt '96 (1996), pp. 72-83
  • 18
    • 84957375076 scopus 로고    scopus 로고
    • Cramer, R., R. Gennaro and B. Schoenmakers, A secure and optimally efficient multi-authority election scheme., in: W. Fumy, editor, Proc. Eurocrypt '97 (1997), pp. 103-118
  • 20
    • 33846585117 scopus 로고    scopus 로고
    • Cranor, L. and R. Cytron., Design and implementation of a practical security-conscious electronic polling system, Technical Report WUCS-96-02, Dept. of Computer Science, Washington University (1996)
  • 21
    • 84948958135 scopus 로고    scopus 로고
    • Desmedt, Y. and K. Kurosawa, How to break a practical mix and design a new one, in: B. Preneel, editor, Proc. Eurocrypt 2000 (2000), pp. 557-572
  • 22
    • 84957800033 scopus 로고    scopus 로고
    • Díaz, C., S. Seys, J. Claessens and B. Preneel, Towards measuring anonymity, in: R. Dingledine and P. Syverson, editors, Proc. PET 2002 (2003), pp. 54-68
  • 24
    • 0038349207 scopus 로고    scopus 로고
    • Freedman, M. and R. Morris, Tarzan: a peer-to-peer anonymizing network layer., in: V. Atluri, editor, ACM Conference on Computer and Communications Security, 2002, pp. 193-206
  • 25
    • 33846568537 scopus 로고    scopus 로고
    • Fujioka, A., T. Okamoto and K. Ohta, A practical secret voting scheme for large scale elections, in: J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT'92 (1992), pp. 244-251
  • 26
    • 84955557456 scopus 로고    scopus 로고
    • Goldschlag, D., M. Reed and P. Syverson, Hiding routing information, in: R. Anderson, editor, Proc. 1st International Workshop on Information Hiding (1996), pp. 137-150
  • 27
    • 0032047481 scopus 로고    scopus 로고
    • A logical approach to multilevel security of probabilistic systems
    • Gray J., and Syverson P. A logical approach to multilevel security of probabilistic systems. Distributed Computing 11 (1998) 73-90
    • (1998) Distributed Computing , vol.11 , pp. 73-90
    • Gray, J.1    Syverson, P.2
  • 29
    • 84948969982 scopus 로고    scopus 로고
    • Hirt, M. and K. Sako, Efficient receipt-free voting based on homomorphic encryption., in: B. Preneel, editor, Proc. Eurocrypt 2000 (2000), pp. 539-556
  • 30
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes D., and Shmatikov V. Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security (2002) 3-36
    • (2002) Journal of Computer Security , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 31
    • 33846570561 scopus 로고    scopus 로고
    • ISO, Common Criteria-ISO/IEC/15408
    • ISO, Common Criteria-ISO/IEC/15408 (1999). http://csrc.nist.gov/cc/
    • (1999)
  • 32
    • 84957709438 scopus 로고    scopus 로고
    • Jakobsson, M., A practical mix, in: K. Nyberg, editor, Proc. Eurocrypt '98 (1998), pp. 448-461
  • 33
    • 33646018220 scopus 로고    scopus 로고
    • J.Y. Halpern, K. O., Anonymity and information hiding in multiagent systems, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, 2003, pp. 75-88
  • 34
    • 33846602832 scopus 로고    scopus 로고
    • Korkea-Aho, M., Anonymity and privacy in the electronic world (1999), seminar on Network Security, Helsinki University of Technology
  • 35
    • 23144432349 scopus 로고    scopus 로고
    • Kremer, S. and M. Ryan, Analysis of an electronic voting protocol in the applied pi calculus, in: S. Sagiv, editor, Proc. ESOP 2005, 2005, pp. 186-200
  • 37
    • 31844446595 scopus 로고    scopus 로고
    • Mauw, S., J. Verschuren and E. de Vink, A formalization of anonymity and onion routing, in: P. Samarati, P. Ryan, D. Gollmann and R. Molva, editors, ESORICS'04 (2004), pp. 109-124
  • 39
    • 23144444779 scopus 로고    scopus 로고
    • Nielsen, C., E. Andersen and H. Nielson, Static validation of a voting protocol, in: P. Degano and L. Viganó, editors, Proc. ARSPA 2005) (2005), pp. 115-134
  • 40
    • 84956974327 scopus 로고    scopus 로고
    • Okamoto, T., Receipt-free electronic voting schemes for large scale elections, in: B. Christianson, B. Crispo, T. Lomas and M. Roe, editors, Proc. Security Protocols Workshop '97 (1998), pp. 25-35
  • 41
    • 85027158725 scopus 로고    scopus 로고
    • Park, C., K. Itoh and K. Kurosawa, Efficient anonymous channel and all/nothing election scheme, in: T. Helleseth, editor, Proc. Eurocrypt '93 (1993), pp. 248-259
  • 43
    • 84948967487 scopus 로고    scopus 로고
    • Pfitzmann, B., Breaking an efficient anonymous channel, in: L. Guillou and J.-J. Quisquater, editors, Proc. Eurocrypt '94 (1995), pp. 332-340
  • 46
    • 84949756689 scopus 로고    scopus 로고
    • Schneider, S. and A. Sidiropoulos, CSP and anonymity, in: Proc. ESORICS'96 (1996), pp. 198-218
  • 47
    • 84957802536 scopus 로고    scopus 로고
    • Serjantov, A. and G. Danezis, Towards an information theoretic metric for anonymity, in: H. Federrath, editor, Proc. PET 2002 (2003), pp. 41-53
  • 48
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic analysis of an anonymity system
    • Shmatikov V. Probabilistic analysis of an anonymity system. Journal of Computer Security 12 (2004) 355-377
    • (2004) Journal of Computer Security , vol.12 , pp. 355-377
    • Shmatikov, V.1
  • 49
    • 35248849922 scopus 로고    scopus 로고
    • Steinbrecher, S. and S. Köpsell, Modelling unlinkability, in: R. Dingledine, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003) (2003), pp. 32-47
  • 50
    • 0030676973 scopus 로고    scopus 로고
    • Syverson, P., D. Goldschlag and M. Reed, Anonymous connections and onion routing, in: IEEE Symposium on Security and Privacy, Oakland, California, 1997, pp. 44-54
  • 51
    • 84924758404 scopus 로고    scopus 로고
    • Syverson, P. and S. Stubblebine, Group principals and the formalization of anonymity, in: J. Wing, J. Woodcock and J. Davies, editors, Proc. FM'99 (1999), pp. 814-833


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.