-
1
-
-
34548014787
-
Towards secure and practical e-elections in the new era
-
Gritzalis, D., ed.: Kluwer Academic Publishers
-
Burmester, M., Magkos, E.: Towards secure and practical e-elections in the new era. In Gritzalis, D., ed.: Secure Electronic Voting. Kluwer Academic Publishers (2003) 63-72
-
(2003)
Secure Electronic Voting
, pp. 63-72
-
-
Burmester, M.1
Magkos, E.2
-
2
-
-
23444459747
-
Secure electronic voting: The current landscape
-
Gritzalis, D., ed.: Kluwer Academic Publishers
-
Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M., Ikonomopoulos, S.: Secure electronic voting: The current landscape. In Gritzalis, D., ed.: Secure Electronic Voting. Kluwer Academic Publishers (2003) 101-122
-
(2003)
Secure Electronic Voting
, pp. 101-122
-
-
Lambrinoudakis, C.1
Gritzalis, D.2
Tsoumas, V.3
Karyda, M.4
Ikonomopoulos, S.5
-
3
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Full paper
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001. (2001) 136-145 Full paper available at http://eprint.iacr.org/2000/67.
-
(2001)
FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
4
-
-
84957375076
-
A secure and optimally eficient multiauthority election scheme
-
proceedings of EUROCRYPT '97
-
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally eficient multiauthority election scheme. In: proceedings of EUROCRYPT '97, LNCS series, volume 1233. (1997) 103-118
-
(1997)
LNCS Series
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
5
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001
-
Damgård, I., Jurik, M.J.: A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, LNCS series, volume 1992. (2001)
-
(2001)
LNCS Series
, vol.1992
-
-
Damgård, I.1
Jurik, M.J.2
-
6
-
-
0034771832
-
Practical multi-candidate election scheme
-
Baudron, O., Fouque, P.A., Pointcheval, D., Poupard, G., Stern, J.: Practical multi-candidate election scheme. In: PODC '01. (2001) 274-283
-
(2001)
PODC '01
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.A.2
Pointcheval, D.3
Poupard, G.4
Stern, J.5
-
7
-
-
26444488543
-
The theory and implementation of an electronic voting system
-
Gritzalis, D., ed.: Kluwer Academic Publishers
-
Damgård, I., Groth, J., Salomonsen, G.: The theory and implementation of an electronic voting system. In Gritzalis, D., ed.: Secure Electronic Voting. Kluwer Academic Publishers (2003) 77-100
-
(2003)
Secure Electronic Voting
, pp. 77-100
-
-
Damgård, I.1
Groth, J.2
Salomonsen, G.3
-
8
-
-
35048823083
-
Evaluating security of voting schemes in the universal composability framework
-
Report 2002/002
-
Groth, J.: Evaluating security of voting schemes in the universal composability framework. Cryptology ePrint Archive, Report 2002/002 (2002)
-
(2002)
Cryptology ePrint Archive
-
-
Groth, J.1
-
9
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
proceedings of CRYPTO '94
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: proceedings of CRYPTO '94, LNCS series, volume 893. (1994) 174-187
-
(1994)
LNCS Series
, vol.893
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
35048833033
-
Parallel coin-tossing and constant round secure two-party computation
-
proceedings of CRYPTO '01
-
Lindell, Y.: Parallel coin-tossing and constant round secure two-party computation. In: proceedings of CRYPTO '01, LNCS series, volume 2139. (2001) 408-432
-
(2001)
LNCS Series
, vol.2139
, pp. 408-432
-
-
Lindell, Y.1
-
12
-
-
1842599265
-
Securing threshold cryptosystems against chosen ciphertext attack
-
Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology 15 (2002) 75-96
-
(2002)
Journal of Cryptology
, vol.15
, pp. 75-96
-
-
Shoup, V.1
Gennaro, R.2
-
13
-
-
84958626761
-
Deniable encryption
-
proceedings of CRYPTO '97
-
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: proceedings of CRYPTO '97, LNCS series, volume 1294. (1997) 90-104
-
(1997)
LNCS Series
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
14
-
-
84958639277
-
Efficient generation of shared rsa keys
-
proceedings of CRYPTO '97
-
Boneh, D., Franklin, M.K.: Efficient generation of shared rsa keys. In: proceedings of CRYPTO '97, LNCS series, volume 1294. (1997) 425-439
-
(1997)
LNCS Series
, vol.1294
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.K.2
-
15
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
proceedings of EUROCRYPT '99
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. In: proceedings of EUROCRYPT '99, LNCS series, volume 1592. (1999) 293-310
-
(1999)
LNCS Series
, vol.1592
, pp. 293-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
84946830669
-
Fully distributed threshold rsa under standard assumptions
-
proceedings of ASIACRYPT '01
-
Fouque, P.A., Stern, J.: Fully distributed threshold rsa under standard assumptions. In: proceedings of ASIACRYPT '01, LNCS series, volume 2248. (2001) 310-330
-
(2001)
LNCS Series
, vol.2248
, pp. 310-330
-
-
Fouque, P.A.1
Stern, J.2
-
17
-
-
84937431456
-
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
-
proceedings of CRYPTO '02
-
Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: proceedings of CRYPTO '02, LNCS series, volume 2442. (2002) 417-432
-
(2002)
LNCS Series
, vol.2442
, pp. 417-432
-
-
Algesheimer, J.1
Camenisch, J.2
Shoup, V.3
-
18
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
proceedings of CRYPTO '99
-
Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive security for threshold cryptosystems. In: proceedings of CRYPTO '99, LNCS series, volume 1666. (1999) 98-115
-
(1999)
LNCS Series
, vol.1666
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
19
-
-
84948968753
-
Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
-
proceedings of EUROCRYPT '00
-
Jarecki, S., Lysyanskaya, A.: Adaptively secure threshold cryptography: Introducing concurrency, removing erasures. In: proceedings of EUROCRYPT '00, LNCS series, volume 1807. (2000) 221-242
-
(2000)
LNCS Series
, vol.1807
, pp. 221-242
-
-
Jarecki, S.1
Lysyanskaya, A.2
-
20
-
-
84946834849
-
Adaptive security in the threshold setting: From cryptosystems to signature schemes
-
proceedings of ASIACRYPT '01
-
Lysyanskaya, A., Peikert, C.: Adaptive security in the threshold setting: From cryptosystems to signature schemes. In: proceedings of ASIACRYPT '01, LNCS series, volume 2248. (2001) 331-350
-
(2001)
LNCS Series
, vol.2248
, pp. 331-350
-
-
Lysyanskaya, A.1
Peikert, C.2
-
21
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
proceedings of CRYPTO '03
-
Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: proceedings of CRYPTO '03, LNCS series, volume 2729. (2003) 247-264
-
(2003)
LNCS Series
, vol.2729
, pp. 247-264
-
-
Damgård, I.1
Nielsen, J.B.2
-
22
-
-
84937437506
-
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
-
proceedings of CRYPTO '02
-
Damgård, I., Nielsen, J.B.: Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In: proceedings of CRYPTO '02, LNCS series, volume 2442. (2002) 581-596
-
(2002)
LNCS Series
, vol.2442
, pp. 581-596
-
-
Damgård, I.1
Nielsen, J.B.2
-
23
-
-
0038784597
-
Non-interactive and reusable non-malleable commitment schemes
-
Damgård, I., Groth, J.: Non-interactive and reusable non-malleable commitment schemes. In: STOC '03. (2003) 426-437
-
(2003)
STOC '03
, pp. 426-437
-
-
Damgård, I.1
Groth, J.2
-
24
-
-
35248886595
-
Strengthening zero-knowledge protocols using signatures
-
proceedings of EUROCRYPT '03, Full paper
-
Garay, J.A., MacKenzie, P.D., Yang, K.: Strengthening zero-knowledge protocols using signatures. In: proceedings of EUROCRYPT '03, LNCS series, volume 2656. (2003) 177-194 Full paper available at htpp://eprint.iacr.org/2003/ 037.
-
(2003)
LNCS Series
, vol.2656
, pp. 177-194
-
-
Garay, J.A.1
MacKenzie, P.D.2
Yang, K.3
|