메뉴 건너뛰기




Volumn 3089, Issue , 2004, Pages 46-60

Evaluating security of voting schemes in the universal composability framework

Author keywords

Homomorphic threshold encryption; Universal composability; Voting

Indexed keywords

CRYPTOGRAPHY;

EID: 35048844767     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24852-1_4     Document Type: Review
Times cited : (53)

References (24)
  • 1
    • 34548014787 scopus 로고    scopus 로고
    • Towards secure and practical e-elections in the new era
    • Gritzalis, D., ed.: Kluwer Academic Publishers
    • Burmester, M., Magkos, E.: Towards secure and practical e-elections in the new era. In Gritzalis, D., ed.: Secure Electronic Voting. Kluwer Academic Publishers (2003) 63-72
    • (2003) Secure Electronic Voting , pp. 63-72
    • Burmester, M.1    Magkos, E.2
  • 3
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Full paper
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS 2001. (2001) 136-145 Full paper available at http://eprint.iacr.org/2000/67.
    • (2001) FOCS 2001 , pp. 136-145
    • Canetti, R.1
  • 4
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally eficient multiauthority election scheme
    • proceedings of EUROCRYPT '97
    • Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally eficient multiauthority election scheme. In: proceedings of EUROCRYPT '97, LNCS series, volume 1233. (1997) 103-118
    • (1997) LNCS Series , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 5
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001
    • Damgård, I., Jurik, M.J.: A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, LNCS series, volume 1992. (2001)
    • (2001) LNCS Series , vol.1992
    • Damgård, I.1    Jurik, M.J.2
  • 7
    • 26444488543 scopus 로고    scopus 로고
    • The theory and implementation of an electronic voting system
    • Gritzalis, D., ed.: Kluwer Academic Publishers
    • Damgård, I., Groth, J., Salomonsen, G.: The theory and implementation of an electronic voting system. In Gritzalis, D., ed.: Secure Electronic Voting. Kluwer Academic Publishers (2003) 77-100
    • (2003) Secure Electronic Voting , pp. 77-100
    • Damgård, I.1    Groth, J.2    Salomonsen, G.3
  • 8
    • 35048823083 scopus 로고    scopus 로고
    • Evaluating security of voting schemes in the universal composability framework
    • Report 2002/002
    • Groth, J.: Evaluating security of voting schemes in the universal composability framework. Cryptology ePrint Archive, Report 2002/002 (2002)
    • (2002) Cryptology ePrint Archive
    • Groth, J.1
  • 9
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • proceedings of CRYPTO '94
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: proceedings of CRYPTO '94, LNCS series, volume 893. (1994) 174-187
    • (1994) LNCS Series , vol.893 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 11
    • 35048833033 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant round secure two-party computation
    • proceedings of CRYPTO '01
    • Lindell, Y.: Parallel coin-tossing and constant round secure two-party computation. In: proceedings of CRYPTO '01, LNCS series, volume 2139. (2001) 408-432
    • (2001) LNCS Series , vol.2139 , pp. 408-432
    • Lindell, Y.1
  • 12
    • 1842599265 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology 15 (2002) 75-96
    • (2002) Journal of Cryptology , vol.15 , pp. 75-96
    • Shoup, V.1    Gennaro, R.2
  • 13
    • 84958626761 scopus 로고    scopus 로고
    • Deniable encryption
    • proceedings of CRYPTO '97
    • Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: proceedings of CRYPTO '97, LNCS series, volume 1294. (1997) 90-104
    • (1997) LNCS Series , vol.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 14
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared rsa keys
    • proceedings of CRYPTO '97
    • Boneh, D., Franklin, M.K.: Efficient generation of shared rsa keys. In: proceedings of CRYPTO '97, LNCS series, volume 1294. (1997) 425-439
    • (1997) LNCS Series , vol.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.K.2
  • 15
    • 49049089688 scopus 로고    scopus 로고
    • Secure distributed key generation for discrete-log based cryptosystems
    • proceedings of EUROCRYPT '99
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. In: proceedings of EUROCRYPT '99, LNCS series, volume 1592. (1999) 293-310
    • (1999) LNCS Series , vol.1592 , pp. 293-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 16
    • 84946830669 scopus 로고    scopus 로고
    • Fully distributed threshold rsa under standard assumptions
    • proceedings of ASIACRYPT '01
    • Fouque, P.A., Stern, J.: Fully distributed threshold rsa under standard assumptions. In: proceedings of ASIACRYPT '01, LNCS series, volume 2248. (2001) 310-330
    • (2001) LNCS Series , vol.2248 , pp. 310-330
    • Fouque, P.A.1    Stern, J.2
  • 17
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • proceedings of CRYPTO '02
    • Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: proceedings of CRYPTO '02, LNCS series, volume 2442. (2002) 417-432
    • (2002) LNCS Series , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 18
    • 84957083549 scopus 로고    scopus 로고
    • Adaptive security for threshold cryptosystems
    • proceedings of CRYPTO '99
    • Canetti, R., Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Adaptive security for threshold cryptosystems. In: proceedings of CRYPTO '99, LNCS series, volume 1666. (1999) 98-115
    • (1999) LNCS Series , vol.1666 , pp. 98-115
    • Canetti, R.1    Gennaro, R.2    Jarecki, S.3    Krawczyk, H.4    Rabin, T.5
  • 19
    • 84948968753 scopus 로고    scopus 로고
    • Adaptively secure threshold cryptography: Introducing concurrency, removing erasures
    • proceedings of EUROCRYPT '00
    • Jarecki, S., Lysyanskaya, A.: Adaptively secure threshold cryptography: Introducing concurrency, removing erasures. In: proceedings of EUROCRYPT '00, LNCS series, volume 1807. (2000) 221-242
    • (2000) LNCS Series , vol.1807 , pp. 221-242
    • Jarecki, S.1    Lysyanskaya, A.2
  • 20
    • 84946834849 scopus 로고    scopus 로고
    • Adaptive security in the threshold setting: From cryptosystems to signature schemes
    • proceedings of ASIACRYPT '01
    • Lysyanskaya, A., Peikert, C.: Adaptive security in the threshold setting: From cryptosystems to signature schemes. In: proceedings of ASIACRYPT '01, LNCS series, volume 2248. (2001) 331-350
    • (2001) LNCS Series , vol.2248 , pp. 331-350
    • Lysyanskaya, A.1    Peikert, C.2
  • 21
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • proceedings of CRYPTO '03
    • Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: proceedings of CRYPTO '03, LNCS series, volume 2729. (2003) 247-264
    • (2003) LNCS Series , vol.2729 , pp. 247-264
    • Damgård, I.1    Nielsen, J.B.2
  • 22
    • 84937437506 scopus 로고    scopus 로고
    • Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
    • proceedings of CRYPTO '02
    • Damgård, I., Nielsen, J.B.: Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In: proceedings of CRYPTO '02, LNCS series, volume 2442. (2002) 581-596
    • (2002) LNCS Series , vol.2442 , pp. 581-596
    • Damgård, I.1    Nielsen, J.B.2
  • 23
    • 0038784597 scopus 로고    scopus 로고
    • Non-interactive and reusable non-malleable commitment schemes
    • Damgård, I., Groth, J.: Non-interactive and reusable non-malleable commitment schemes. In: STOC '03. (2003) 426-437
    • (2003) STOC '03 , pp. 426-437
    • Damgård, I.1    Groth, J.2
  • 24
    • 35248886595 scopus 로고    scopus 로고
    • Strengthening zero-knowledge protocols using signatures
    • proceedings of EUROCRYPT '03, Full paper
    • Garay, J.A., MacKenzie, P.D., Yang, K.: Strengthening zero-knowledge protocols using signatures. In: proceedings of EUROCRYPT '03, LNCS series, volume 2656. (2003) 177-194 Full paper available at htpp://eprint.iacr.org/2003/ 037.
    • (2003) LNCS Series , vol.2656 , pp. 177-194
    • Garay, J.A.1    MacKenzie, P.D.2    Yang, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.