-
1
-
-
62749126734
-
-
Acquisti, A., 2004. Receipt-free homomorphic elections and write-in voter verified ballots. Technical Report 2004/105, International Association for Crypto logic Research, May 2, 2004 and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004. http://www.heinz.cmu. edu/̃acquisti/papers/acquisti-.
-
Acquisti, A., 2004. Receipt-free homomorphic elections and write-in voter verified ballots. Technical Report 2004/105, International Association for Crypto logic Research, May 2, 2004 and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004. http://www.heinz.cmu. edu/̃acquisti/papers/acquisti-.
-
-
-
-
3
-
-
0034771832
-
Practical multi-candidate election system
-
ACM, New York, USA, pp
-
Baudron, O., P. A. Fouque, D. Pointcheval, G. Poupard and S. lacques, 2001. Practical multi-candidate election system. Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, 2001, ACM, New York, USA., pp: 274-283.
-
(2001)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.A.2
Pointcheval, D.3
Poupard, G.4
lacques, S.5
-
4
-
-
0028087488
-
Receipt-free secretballot elections
-
May 23-25, ACM, New York, USA, pp
-
Benaloh, I. and D. Tuinstra, 1994. Receipt-free secretballot elections. Proceeding of the 26th Annual ACM Symposium on Theory of Computing, May 23-25, ACM, New York, USA., pp: 544-553.
-
(1994)
Proceeding of the 26th Annual ACM Symposium on Theory of Computing
, pp. 544-553
-
-
Benaloh, I.1
Tuinstra, D.2
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Chaum, D.L., 1981. Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM, 24: 84-88.
-
(1981)
Commun. ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.L.1
-
7
-
-
0031632567
-
Concurrent zero knowledge
-
USA, pp
-
Dwork, C, M. Naor and A. Sahai, 1998. Concurrent zero knowledge. Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998, USA., pp: 409-418.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
8
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
Fan, L., C.X. Xu and I.H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett, 38: 705-706.
-
(2002)
Elect. Lett
, vol.38
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, I.H.3
-
9
-
-
37349038164
-
-
Feng, T. and I.F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. I. Software, 18: 2871-2881.
-
Feng, T. and I.F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. I. Software, 18: 2871-2881.
-
-
-
-
11
-
-
62749159806
-
Deniable authentication protocol resisting man-in-the-middle attack
-
Han, S., W. Liu and E. Chang, 2004. Deniable authentication protocol resisting man-in-the-middle attack. Proceedings of World Academy of Science, Engineering and Technology, 2004, pp: 292-295.
-
(2004)
Proceedings of World Academy of Science, Engineering and Technology
, pp. 292-295
-
-
Han, S.1
Liu, W.2
Chang, E.3
-
13
-
-
33845950814
-
A novel deniable authentication protocol using generalized ElGamal signature scheme
-
Lee, W.B., C.C. Wu and W.J. Tsaur, 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Inform. Sci., 177: 1376-1381.
-
(2007)
Inform. Sci
, vol.177
, pp. 1376-1381
-
-
Lee, W.B.1
Wu, C.C.2
Tsaur, W.J.3
-
14
-
-
26044448602
-
A new deniable authentication protocol from bilinear pairings
-
Lu, R. andZ. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput, 168: 954-961.
-
(2005)
Applied Math. Comput
, vol.168
, pp. 954-961
-
-
Lu1
andZ, R.2
Cao3
-
15
-
-
14844309431
-
Non-interactive deniable authentication protocol based on factoring
-
Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27: 401-405.
-
(2005)
Comput. Standards Interfaces
, vol.27
, pp. 401-405
-
-
Lu, R.1
Cao, Z.2
-
16
-
-
38049013737
-
An internet voting protocol with receipt free and coercion-resistant
-
Oct. 16-19, IEEE Computer Society, Washington DC, USA, pp
-
Meng, B., 2007. An internet voting protocol with receipt free and coercion-resistant. Proceedings of 7th IEEE International Conference on Computer and Information Technology, Oct. 16-19, IEEE Computer Society, Washington DC, USA., pp: 721-726.
-
(2007)
Proceedings of 7th IEEE International Conference on Computer and Information Technology
, pp. 721-726
-
-
Meng, B.1
-
17
-
-
57249084061
-
-
Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7: 1133-1140.
-
Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7: 1133-1140.
-
-
-
-
18
-
-
0011828723
-
Receipt-free electronic voting schemes for large scale elections
-
Apr. 7-9, Springer-Verlag, London, UK, pp
-
Okamoto, T., 1997. Receipt-free electronic voting schemes for large scale elections. Proceedings of 5th International Workshop on Security Protocols, Apr. 7-9, Springer-Verlag, London, UK., pp: 25-35.
-
(1997)
Proceedings of 5th International Workshop on Security Protocols
, pp. 25-35
-
-
Okamoto, T.1
-
19
-
-
33746912795
-
Efficient non-interactive deniable authentication protocols
-
Sept. 21-23, IEEE Computer Society Washington, DC. USA, pp
-
Qian, H.F., Z.F. Cao, L.C. Wang and Q.S. Xue, 2005. Efficient non-interactive deniable authentication protocols. Proceedings of the 5th International Conference on Computer and Information Technology, Sept. 21-23, IEEE Computer Society Washington, DC. USA., pp: 673-679.
-
(2005)
Proceedings of the 5th International Conference on Computer and Information Technology
, pp. 673-679
-
-
Qian, H.F.1
Cao, Z.F.2
Wang, L.C.3
Xue, Q.S.4
-
20
-
-
33745767675
-
New approaches for deniable authentication
-
Nov. 7-11, ACM Press, New York, pp
-
Raimondo, M.D. and R. Gennaro, 2005. New approaches for deniable authentication. Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 7-11, ACM Press, New York, pp: 112-121.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Raimondo, M.D.1
Gennaro, R.2
-
21
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26: 449-454.
-
(2004)
Comput. Standards Interfaces
, vol.26
, pp. 449-454
-
-
Shao, Z.1
-
22
-
-
15544375802
-
Identity-based deniable authentication protocol
-
Shi, Y. and J. Li, 2005. Identity-based deniable authentication protocol. Electron. Lett, 41: 241-242.
-
(2005)
Electron. Lett
, vol.41
, pp. 241-242
-
-
Shi, Y.1
Li, J.2
-
23
-
-
33745211009
-
Cryptanalysis of a suite of deniable authentication protocols
-
Zhu, R.W., D.S. Wong and C.H. Lee, 2006. Cryptanalysis of a suite of deniable authentication protocols. IEEE Commun. Lett., 10: 504-506.
-
(2006)
IEEE Commun. Lett
, vol.10
, pp. 504-506
-
-
Zhu, R.W.1
Wong, D.S.2
Lee, C.H.3
|