메뉴 건너뛰기




Volumn 8, Issue 7, 2009, Pages 936-964

A critical review of receipt-freeness and coercion-resistance

Author keywords

Coercer; Cryptographic primitive; Security protocol; Vote buyer

Indexed keywords

ARTS COMPUTING; AUTHENTICATION; ELECTRONIC VOTING;

EID: 69749102464     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2009.934.964     Document Type: Review
Times cited : (22)

References (187)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M. and A.D. Gordon, 1999. A calculus for cryptographic protocols: The spi calculus. Inform. Comput., 148: 1-70.
    • (1999) Inform. Comput. , vol.148 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 84957715741 scopus 로고    scopus 로고
    • Universally verifiable mix-net with verification work independent of the number of mix-centers
    • Abe, M., 1998. Universally verifiable mix-net with verification work independent of the number of mix-centers. Eurocrypt '98, pp: 437-447.
    • (1998) Eurocrypt '98 , pp. 437-447
    • Abe, M.1
  • 5
    • 34548171199 scopus 로고    scopus 로고
    • Receipt-free homomorphic elections and write-in voter verified ballots
    • May 2, 2004 and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004
    • Acquisti, A., 2004. Receipt-free homomorphic elections and write-in voter verified ballots. Technical Report 2004/105, International Association for Cryptologic Research, May 2, 2004 and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004. http://www.heinz.cmu.edu/ ~acquisti/ papers/acquisti-.
    • (2004) Technical Report 2004/105, International Association for Cryptologic Research
    • Acquisti, A.1
  • 7
    • 33750277385 scopus 로고    scopus 로고
    • An efficient mixnet-based voting scheme providing receipt-freeness
    • Aditya, R., B. Lee, C. Boyd and E. Dawson, 2004. An efficient mixnet-based voting scheme providing receipt-freeness. Lecture Notes Comput. Sci., 3184: 152-161.
    • (2004) Lecture Notes Comput. Sci. , vol.3184 , pp. 152-161
    • Aditya, R.1    Lee, B.2    Boyd, C.3    Dawson, E.4
  • 11
    • 35048873387 scopus 로고    scopus 로고
    • Identity-based chameleon hash and applications
    • Juels, A. (Ed.), Springer Verlag, Berlin Heidelberg, 978-3-540-22420
    • Ateniese, G. and B. Medeiros, 2004. Identity-Based Chameleon Hash and Applications. In: Financial Cryptography, Juels, A. (Ed.). Springer Verlag, Berlin Heidelberg, 978-3-540-22420, pp: 164-180.
    • (2004) Financial Cryptography , pp. 164-180
    • Ateniese, G.1    Medeiros, B.2
  • 13
    • 51749097575 scopus 로고    scopus 로고
    • Automated verification of remote electronic voting protocols in the applied Pi-calculus
    • Jun. 23-25, IEEE Computer Society, Washington, DC
    • Backes, M., C. Hritcu and M. Maffei, 2008. Automated verification of remote electronic voting protocols in the applied Pi-calculus. Proceedings of the 21st IEEE Computer Security Foundations Symposium, Jun. 23-25, IEEE Computer Society, Washington, DC, pp: 195-209.
    • (2008) Proceedings of the 21st IEEE Computer Security Foundations Symposium , pp. 195-209
    • Backes, M.1    Hritcu, C.2    Maffei, M.3
  • 14
    • 33646817427 scopus 로고    scopus 로고
    • Universal designated signature proof (or how to efficiently prove the knowledge of a signature)
    • Roy, B. (Ed.). Springer-Verlag, Berlin Heidelberg
    • Baek, J., R. Safavi-Naini and W. Susilo, 2005. Universal Designated Signature Proof (or How to Efficiently Prove the Knowledge of a Signature). In: Advances inCryptology-ASIACRYPT, Roy, B. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 644-661.
    • (2005) Advances in Cryptology-ASIACRYPT , pp. 644-661
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 17
    • 40349089019 scopus 로고    scopus 로고
    • Perfectly-secure MPC with linear communication complexity
    • Canetti, R. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Beerliova, Z. and M. Hirt, 2008. Perfectly-Secure MPC with Linear Communication Complexity. In: Theory of Cryptography, Canetti, R. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 213-230.
    • (2008) Theory of Cryptography , pp. 213-230
    • Beerliova, Z.1    Hirt, M.2
  • 18
  • 20
    • 33745561884 scopus 로고    scopus 로고
    • Ring signatures: Stronger definitions and constructions without random oracles
    • Halevi, S. and T Rabin (Eds.). Springer-Verlag, Berlin Heidelberg
    • Bender, A., J. Katz and R. Morselli, 2006. Ring Signatures: Stronger Definitions and Constructions Without Random Oracles. In: Theory of Cryptography, Halevi, S. and T Rabin (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 60-79.
    • (2006) Theory of Cryptography , pp. 60-79
    • Bender, A.1    Katz, J.2    Morselli, R.3
  • 21
    • 64249149755 scopus 로고    scopus 로고
    • Ring signatures: Stronger definitions and constructions without random oracles
    • Bender, A., J. Katz and R Morselli, 2009. Ring signatures: Stronger definitions and constructions without random oracles. J. Cryptol., 22: 114-138.
    • (2009) J. Cryptol. , vol.22 , pp. 114-138
    • Bender, A.1    Katz, J.2    Morselli, R.3
  • 22
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Jun. 11-13, IEEE Computer Society, Washington, DC
    • Blanchet, B., 2001. An efficient cryptographic protocol verifier based on prolog rules. Proceedings of the 14th IEEE Workshop on Computer Security Foundations, Jun. 11-13, IEEE Computer Society, Washington, DC, pp: 82-96.
    • (2001) Proceedings of the 14th IEEE Workshop on Computer Security Foundations , pp. 82-96
    • Blanchet, B.1
  • 23
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • Blum, M. and S. Micali, 1984. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput, 13: 850-864.
    • (1984) SIAM J. Comput , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 25
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Biham, E. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Boneh, D., C. Gentry, B. Lynn and H. Shacham, 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Advance in Cryptology-Eurocrypt 2003, Biham, E. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 416-423.
    • (2003) Advance in Cryptology-Eurocrypt 2003 , pp. 416-423
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 26
    • 84884384634 scopus 로고    scopus 로고
    • Department of Computer Science, The Johns Hopkins University
    • Bungale, P. and S. Sridhar, 2003. Electronic voting a survey. Department of Computer Science, The Johns Hopkins University.
    • (2003) Electronic Voting a Survey
    • Bungale, P.1    Sridhar, S.2
  • 30
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Franklin, M. (Ed.). Springer-Verlag, Berlin Heidelberg
    • Camenisch, J. and A. Lysyanskaya, 2004. Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Advances in Cryptology-CRYPTO 2004, Franklin, M. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 56-72.
    • (2004) Advances in Cryptology-CRYPTO 2004 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 33
    • 33749458214 scopus 로고    scopus 로고
    • Provably secure robust threshold partial blind signature
    • Cao, Z.F., H.J. Zhu and R.X. Lu, 2006. Provably secure robust threshold partial blind signature. Sci. China Ser. F: Inform. Sci., 49: 604-615.
    • (2006) Sci. China Ser. F: Inform. Sci. , vol.49 , pp. 604-615
    • Cao, Z.F.1    Zhu, H.J.2    Lu, R.X.3
  • 35
    • 33744970314 scopus 로고    scopus 로고
    • An anonymous voting mechanism based on the key exchange protocol
    • Chang, C.C. and J.S. Lee, 2006. An anonymous voting mechanism based on the key exchange protocol. Comput. Security, 25: 307-314.
    • (2006) Comput. Security , vol.25 , pp. 307-314
    • Chang, C.C.1    Lee, J.S.2
  • 36
    • 0019532104 scopus 로고
    • Untraceable electronic mail return addresses and digital pseudonyms
    • Chaum, D.L., 1981. Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM, 24: 84-88.
    • (1981) Commun. ACM , vol.24 , pp. 84-88
    • Chaum, D.L.1
  • 37
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D., 1985. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28: 1030-1044.
    • (1985) Commun. ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 39
    • 85043778396 scopus 로고
    • Zero-knowledge undeniable signatures
    • Damgard, LB. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Chaum, D., 1990. Zero-Knowledge Undeniable Signatures. In: Advances in Cryptology-Eurocrypt '90, Damgard, LB. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 458-464.
    • (1990) Advances in Cryptology-Eurocrypt '90 , pp. 458-464
    • Chaum, D.1
  • 40
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Brassard, G. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Chaum, D. and H. Van Antwerpen, 1990. Undeniable Signatures. In: Advances in Cryptology Crypto'89, Brassard, G. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 212-216.
    • (1990) Advances in Cryptology Crypto'89 , pp. 212-216
    • Chaum, D.1    Van Antwerpen, H.2
  • 41
    • 33646745945 scopus 로고    scopus 로고
    • United States Patent 5, 493, 614
    • Chaum, D., 1996. Private signature and proof systems. United States Patent 5, 493, 614. http://www.google. com/patents?hl=zh-CN&lr=&vid= USPAT5493614&id=Q4keAAAAEBAJ&oi=fnd.
    • (1996) Private Signature and Proof Systems
    • Chaum, D.1
  • 42
    • 0001604533 scopus 로고    scopus 로고
    • Blind signatures for untraceable payments
    • LNCS1440, CRYPTO'82, Springer-Verlag, London
    • Chaum, D., 1998. Blind signatures for untraceable payments. Proceedings of the Advances in Cryptology, LNCS1440, CRYPTO'82, Springer-Verlag, London, pp: 199-203.
    • (1998) Proceedings of the Advances in Cryptology , pp. 199-203
    • Chaum, D.1
  • 44
    • 2342617507 scopus 로고    scopus 로고
    • Secret-ballot receipts: True voter-verifiable elections
    • Chaum, D., 2004. Secret-ballot receipts: True voter-verifiable elections. IEEE Security Privacy, 2: 38-47.
    • (2004) IEEE Security Privacy , vol.2 , pp. 38-47
    • Chaum, D.1
  • 46
    • 38349013711 scopus 로고    scopus 로고
    • A framework for automatically checking anonymity with μCRL
    • Montanari, U. D. Sannella and R. Bruni (Eds.). Springer-Verlag, Berlin Heidelberg
    • Chothia, T., S. Orzan, J. Pang and M.T. Dashti, 2007. A Framework for Automatically Checking Anonymity with μCRL. In: Trustworthy Global Computing, Montanari, U. D. Sannella and R. Bruni (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 301-318.
    • (2007) Trustworthy Global Computing , pp. 301-318
    • Chothia, T.1    Orzan, S.2    Pang, J.3    Dashti, M.T.4
  • 47
    • 38549140171 scopus 로고    scopus 로고
    • Short ballot assumption and three ballot voting protocol
    • Geffert V. et al (Eds.). Springer-Verlag, Berlin Heidelberg
    • Cichon, J., M. Kutylowski and B. Glor^ 2008. Short Ballot Assumption and Three ballot Voting Protocol. In: SOFSEM 2008: Theory and Practice of Computer Science, Geffert, V. et al (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 585-598.
    • (2008) SOFSEM 2008: Theory and Practice of Computer Science , pp. 585-598
    • Cichon, J.1    Kutylowski, M.2    Glorz, B.3
  • 51
    • 84957375076 scopus 로고    scopus 로고
    • A Secure and Optimally Efficient Multi-Authority Election Scheme
    • Advances in Cryptology - Eurocrypt '97
    • Cramer, R., R. Gennaro and B. Schoenmakers, 1997. A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Trustworthy Global Computing, Fumy, W. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 103-118. (Pubitemid 127067797)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 58
    • 84958770476 scopus 로고
    • Weakness of undeniable signature schemes
    • Davies D.E. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Desmedt, Y. andM. Yung, 1991. Weakness of Undeniable Signature Schemes. In: Advances in Cryptology EUROCRYPT '91, Davies D.E. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 205-220.
    • (1991) Advances in Cryptology EUROCRYPT '91 , pp. 205-220
    • Desmedt, Y.1    Yung, M.2
  • 59
    • 84948958135 scopus 로고    scopus 로고
    • How to break a practical MIX and design a new one
    • Preneel, B. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Desmedt, Y. and K. Kurosawa, 2000. How to Break a Practical MIX and Design a New One. In: Advances inCiyptology-EUROCRYPT 2000, Preneel, B. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 557-572.
    • (2000) Advances in Ciyptology-EUROCRYPT 2000 , pp. 557-572
    • Desmedt, Y.1    Kurosawa, K.2
  • 60
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D. and A.C. Yao, 1983. On the security of public key protocols. IEEE Trans. Inform. Theor., 29: 198-208.
    • (1983) IEEE Trans. Inform. Theor. , vol.29 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 61
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Sept. 10-13, Cloudcroft, New Mexico
    • Du, W. and M.J. Atallah, 2001. Secure multi-party computation problems and their applications: A review and open problems. Proceedings of the 2001 Workshop on New Security Paradigms, Sept. 10-13, Cloudcroft, New Mexico, pp: 13-22.
    • (2001) Proceedings of the 2001 Workshop on New Security Paradigms , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 63
    • 52949134446 scopus 로고    scopus 로고
    • An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
    • Fan, C.I. and W.Z. Sun, 2008. An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Math. Comput. Modell, 48: 1611-1627.
    • (2008) Math. Comput. Modell , vol.48 , pp. 1611-1627
    • Fan, C.I.1    Sun, W.Z.2
  • 64
    • 0037019232 scopus 로고    scopus 로고
    • Deniable authentication protocol based on Diffie-Hellman algorithm
    • Fan, L., C.X. Xu and J.H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett, 38: 705-706.
    • (2002) Elect. Lett. , vol.38 , pp. 705-706
    • Fan, L.1    Xu, C.X.2    Li, J.H.3
  • 65
    • 37349038164 scopus 로고    scopus 로고
    • Universally composable security concurrent deniable authentication based on witness indistinguishable
    • Feng, T. and J.F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. J. Software, 18: 2871-2881.
    • (2007) J. Software , vol.18 , pp. 2871-2881
    • Feng, T.1    Ma, J.F.2
  • 68
  • 69
  • 70
    • 37749037987 scopus 로고    scopus 로고
    • Anew(t, N-2) resilience mix net
    • Gao, H.M., X.F. Chen and Y.M. Wang, 2003. Anew(t, N-2) resilience mix net. Chinese J. Comput, 26: 1361-1365.
    • (2003) Chinese J. Comput , vol.26 , pp. 1361-1365
    • Gao, H.M.1    Chen, X.F.2    Wang, Y.M.3
  • 71
  • 77
    • 35048844767 scopus 로고    scopus 로고
    • Evaluating security of voting schemes in the universal composability framework
    • Jakobsson, M., M. Yung and J. Zhou (Eds.). Springer-Verlag, Berlin Heidelberg
    • Groth, J., 2004. Evaluating Security of Voting Schemes in the Universal Composability Framework. In: Applied Cryptography and Network Security, Jakobsson, M., M. Yung and J. Zhou (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 46-60.
    • (2004) Applied Cryptography and Network Security , pp. 46-60
    • Groth, J.1
  • 82
    • 35248861868 scopus 로고    scopus 로고
    • Efficient secure multiparty computation
    • Okamoto, T. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Hirt, M., U. Maurer and B. Przydatek, 2000. Efficient Secure Multiparty Computation. In: Advances in Cryptology-ASIACRYPT 2000, Okamoto, T. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 143-161.
    • (2000) Advances in Cryptology-ASIACRYPT 2000 , pp. 143-161
    • Hirt, M.1    Maurer, U.2    Przydatek, B.3
  • 83
    • 33749561443 scopus 로고    scopus 로고
    • Robust multiparty computation with linear communication complexity
    • Springer-Verlag, Berlin Heidelberg
    • Hirt M. and J.B. Nielsen, 2006. Robust Multiparty Computation with Linear Communication Complexity. In: Advance in Cryptilogy-CRYPTO 2006, Springer-Verlag, Berlin Heidelberg, pp: 463-482.
    • (2006) Advance in Cryptilogy-CRYPTO 2006 , pp. 463-482
    • Hirt, M.1    Nielsen, J.B.2
  • 85
    • 49549102632 scopus 로고    scopus 로고
    • Short designated verifier signature scheme and its identity-based variant
    • Huang, X.Y., W. Susilo, Y. Mu and F. Zhang, 2008. Short designated verifier signature scheme and its identity-based variant. Int. J. Network Security, 6: 82-93.
    • (2008) Int. J. Network Security , vol.6 , pp. 82-93
    • Huang, X.Y.1    Susilo, W.2    Mu, Y.3    Zhang, F.4
  • 87
    • 69749086390 scopus 로고    scopus 로고
    • A method for obtaining deniable public-key encryption
    • Ibrahim, M.H., 2009a. A method for obtaining deniable public-key encryption. Int. J. Network Security, 8: 1-9.
    • (2009) Int. J. Network Security , vol.8 , pp. 1-9
    • Ibrahim, M.H.1
  • 88
    • 69749087308 scopus 로고    scopus 로고
    • Receiver-deniable public-key encryption
    • Ibrahim, M.H., 2009b. Receiver-deniable public-key encryption. Int. J. Network Security, 8: 159-165.
    • (2009) Int. J. Network Security , vol.8 , pp. 159-165
    • Ibrahim, M.H.1
  • 89
    • 84927728020 scopus 로고
    • Blackmailing using undeniable signatures
    • De Santis, A. (Ed), Springer-Verlag, Berlin Heidelberg
    • Jakobsson, M., 1994. Blackmailing Using Undeniable Signatures. In: Advances in Cryptology EUROCRYPT '94, De Santis, A. (Ed). Springer-Verlag, Berlin Heidelberg, pp: 425-427.
    • (1994) Advances in Cryptology EUROCRYPT '94 , pp. 425-427
    • Jakobsson, M.1
  • 99
    • 34547579290 scopus 로고    scopus 로고
    • Identity based strong designated verifier signature scheme
    • Kancharla, P., K. Gummadidala and S. Saxen, 2007. Identity based strong designated verifier signature scheme. Informatica, 18: 239-252.
    • (2007) Informatica , vol.18 , pp. 239-252
    • Kancharla, P.1    Gummadidala, K.2    Saxen, S.3
  • 100
    • 85077591735 scopus 로고    scopus 로고
    • Cryptographic voting protocols: A systems perspective
    • Baltimore, MD, Jul. 31-Aug. 05, USENIX Association, Berkeley, CA
    • Karlof, C., N. Sastry andD. Wagner, 2005. Cryptographic voting protocols: A systems perspective. Proceedings of the 14th Conference on USENIX Security Symposium-Vol. 14, Baltimore, MD, Jul. 31-Aug. 05, USENIX Association, Berkeley, CA, pp:l-17.
    • (2005) Proceedings of the 14th Conference on USENIX Security Symposium , vol.14 , pp. 1-17
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 104
    • 70350441588 scopus 로고    scopus 로고
    • An epistemic approach to coercion-resistance for electronic voting protocols
    • IEEE Computer Society
    • Kousters, R. and T. Truderung, 2009. An epistemic approach to coercion-resistance for electronic voting protocols. IEEE Symposium on Security and Privacy, IEEE Computer Society.
    • (2009) IEEE Symposium on Security and Privacy
    • Kousters, R.1    Truderung, T.2
  • 106
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an electronic voting protocol in the applied Pi calculus
    • Kremer S. and M.D. Ryan, 2005. Analysis of an electronic voting protocol in the applied Pi calculus. Lect. Notes Comput. Sci., 3444: 186-200.
    • (2005) Lect. Notes Comput. Sci. , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2
  • 107
    • 35048878760 scopus 로고    scopus 로고
    • Multi-designated verifiers signatures
    • Lopez, J., S. Qing and E. Okamoto (Eds.), Spring er-Verlag, Berlin Heidelberg
    • Laguillaumie, F. andD. Vergnaud, 2004. Multi-Designated Verifiers Signatures. In: Information and Communi Cations Security, Lopez, J., S. Qing and E. Okamoto (Eds.). Spring er-Verlag, Berlin Heidelberg, pp: 495-507.
    • (2004) Information and Communications Security , pp. 495-507
    • Laguillaumie, F.1    Vergnaud, D.2
  • 109
    • 33750008172 scopus 로고    scopus 로고
    • Universal designated verifier signatures without random oracles or non-black box assumptions
    • De Prisco, R. and M. Yung (Eds.). Springer-Verlag, Berlin Heidelberg
    • Laguillaumie, F., B. Libert and J.J. Quisquater, 2006. Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box Assumptions. In: Security and Cryptography for Networks, De Prisco, R. and M. Yung (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 63-77.
    • (2006) Security and Cryptography for Networks , pp. 63-77
    • Laguillaumie, F.1    Libert, B.2    Quisquater, J.J.3
  • 111
    • 67651030027 scopus 로고    scopus 로고
    • Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring
    • Lee, J.S. and J.H. Chang, 2006. Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring. Int. J. Comput. Sci. Network Security, 6: 205-210.
    • (2006) Int. J. Comput. Sci. Network Security , vol.6 , pp. 205-210
    • Lee, J.S.1    Chang, J.H.2
  • 112
    • 33845950814 scopus 로고    scopus 로고
    • A novel deniable authentication protocol using generalized ElGamal signature scheme
    • Lee, W.B., C.C. Wu and W.J. Tsaur, 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Inform. Sci., 177: 1376-1381.
    • (2007) Inform. Sci. , vol.177 , pp. 1376-1381
    • Lee, W.B.1    Wu, C.C.2    Tsaur, W.J.3
  • 114
    • 37749040626 scopus 로고    scopus 로고
    • Cryptanalysis of a (t, N-2) resilient mix net
    • Li, L.H., S.F. Fu and G.Z. Xiao, 2007. Cryptanalysis of a (t, N-2) resilient Mix Net. J. Xidian Univ., 34: 926-934.
    • (2007) J. Xidian Univ. , vol.34 , pp. 926-934
    • Li, L.H.1    Fu, S.F.2    Xiao, S.F.3
  • 115
    • 35048866374 scopus 로고    scopus 로고
    • Identity based undeniable signatures
    • CT-RSA 2004, Springer-Verlag, Berlin Heidelberg
    • Libert, B. and J.J. Quisquater, 2004. Identity Based Undeniable Signatures. In: Topics in Cryptology, CT-RSA 2004, Springer-Verlag, Berlin Heidelberg, pp: 112-125.
    • (2004) Topics in Cryptology , pp. 112-125
    • Libert, B.1    Quisquater, J.J.2
  • 118
    • 26044448602 scopus 로고    scopus 로고
    • A new deniable authentication protocol from bilinear pairings
    • DOI 10.1016/j.amc.2004.09.030, PII S0096300304006538
    • Lu, R. andZ. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput, 168: 954-961. (Pubitemid 41405653)
    • (2005) Applied Mathematics and Computation , vol.168 , Issue.2 , pp. 954-961
    • Lu, R.1    Cao, Z.2
  • 119
    • 14844309431 scopus 로고    scopus 로고
    • Non-interactive deniable authentication protocol based on factoring
    • DOI 10.1016/j.csi.2004.09.007, PII S0920548904001096, Mobile Commerce: A New Frontier in e-Commerce and Wireless Communication
    • Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27: 401-405. (Pubitemid 40339687)
    • (2005) Computer Standards and Interfaces , vol.27 , Issue.4 , pp. 401-405
    • Lu, R.1    Cao, Z.2
  • 120
    • 0032684740 scopus 로고    scopus 로고
    • I/O automaton models and proofs for shared-key communication systems
    • Jun. 28-30, Washington, DC, USA
    • Lynch, N., 1999. I/O automaton models and proofs for shared-key communication systems. Proceedings of the 12th IEEE Computer Security Foundations Workshop, Jun. 28-30, Washington, DC, USA., pp: 14-114.
    • (1999) Proceedings of the 12th IEEE Computer Security Foundations Workshop , pp. 14-114
    • Lynch, N.1
  • 123
    • 38549169691 scopus 로고    scopus 로고
    • Simulation-based analysis of E2E voting systems
    • Alkassar, A. and M. Volkamer (Eds.). Springer Verlag, Berlin Heidelberg
    • Marneffe, O., O. Pereira and J.J. Quisquater, 2007. Simulation-Based Analysis of E2E Voting Systems. In: E-Voting and Identity, Alkassar, A. and M. Volkamer (Eds.). Springer Verlag, Berlin Heidelberg, pp: 137-149.
    • (2007) E-Voting and Identity , pp. 137-149
    • Marneffe, O.1    Pereira, O.2    Quisquater, J.J.3
  • 124
    • 1642340152 scopus 로고    scopus 로고
    • Is there a future for internet voting?
    • Mason, S., 2004. Is there a future for Internet voting? Comput. Fraud Security, 2004: 6-13.
    • (2004) Comput. Fraud Security , vol.2004 , pp. 6-13
    • Mason, S.1
  • 126
    • 38049013737 scopus 로고    scopus 로고
    • An internet voting protocol with receipt-free and coercion-resistant
    • Oct. 16-19, IEEE Computer Society, WashingtonDC, USA
    • Meng, B., 2007 a. An internet voting protocol with receipt-free and coercion-resistant. Proceedings of 7th IEEE International Conference on Computer and Information Technology, Oct. 16-19, IEEE Computer Society, WashingtonDC, USA., pp: 721-726.
    • (2007) Proceedings of 7th IEEE International Conference on Computer and Information Technology , pp. 721-726
    • Meng, B.1
  • 127
    • 49049110480 scopus 로고    scopus 로고
    • Analysis of internet voting protocols with jonker-vink receipt freeness formal model
    • Nov. 21-23, ICCIT., IEEE Computer Society, Washington, DC
    • Meng, B., 2007b. Analysis of internet voting protocols with jonker-vink receipt freeness formal model. Proceedings of the 2007 international Conference on Convergence information Technology, Nov. 21-23, ICCIT., IEEE Computer Society, Washington, DC, pp: 663-669.
    • (2007) Proceedings of the 2007 International Conference on Convergence information Technology , pp. 663-669
    • Meng, B.1
  • 128
    • 57249084061 scopus 로고    scopus 로고
    • Formal analysis of key properties in the internet voting protocol using applied pi calculus
    • Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7: 1133-1140.
    • (2008) Inform. Technol. J. , vol.7 , pp. 1133-1140
    • Meng, B.1
  • 129
    • 62749124406 scopus 로고    scopus 로고
    • A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol
    • Meng, B., 2009a. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol. Inform. Technol. J., 8: 302-309.
    • (2009) Inform. Technol. J. , vol.8 , pp. 302-309
    • Meng, B.1
  • 130
    • 69749119739 scopus 로고    scopus 로고
    • A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext
    • Meng, B., 2009b. A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext J. Networks, 4: 370-377.
    • (2009) J. Networks , vol.4 , pp. 370-377
    • Meng, B.1
  • 131
    • 67651029682 scopus 로고    scopus 로고
    • A formal logic framework for receipt-freeness in internet voting protocol
    • Meng, B., 2009c. A formal logic framework for receipt-freeness in internet voting protocol. J. Comput, 4: 184-192.
    • (2009) J. Comput , vol.4 , pp. 184-192
    • Meng, B.1
  • 132
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • Merkle, R.C., 1978. Secure communications over insecure channels. Commun. ACM, 21: 294-299.
    • (1978) Commun. ACM , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 133
    • 0004256761 scopus 로고
    • Ph.D Thesis. Georgia Institute of Technology
    • Merritt, M.J., 1983. Cryptographic protocols. Ph.D Thesis. Georgia Institute of Technology.
    • (1983) Cryptographic Protocols
    • Merritt, M.J.1
  • 136
    • 69549094995 scopus 로고    scopus 로고
    • Attack for flash MIX
    • Okamoto, T. (Ed.), Springer-Verlag, Berlin Heidelberg
    • Mitomo, M. and K. Kurosawa, 2000. Attack for Flash MIX. In: Advances in Cryptology-ASIACRYPT 2000, Okamoto, T. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 192-204.
    • (2000) Advances in Cryptology-ASIACRYPT 2000 , pp. 192-204
    • Mitomo, M.1    Kurosawa, K.2
  • 137
    • 33749582253 scopus 로고    scopus 로고
    • Receipt-free universally-verifiable voting with everlasting privacy
    • Dwork, C. (Ed.). Springer-Verlag, Berlin Heidelberg
    • Moran, T. andM. Naor, 2006. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Advances in Cryptology-CRYPTO 2006, Dwork, C. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 373.
    • (2006) Advances in Cryptology-CRYPTO 2006 , pp. 373
    • Moran, T.1    Naor, M.2
  • 142
    • 0032272621 scopus 로고    scopus 로고
    • A comparative overview ofcryptographic voting protocols
    • Nurmi, H. and A. Salomaa, 1998. A comparative overview ofcryptographic voting protocols. Ann. Operat. Res., 84: 29-43.
    • (1998) Ann. Operat. Res. , vol.84 , pp. 29-43
    • Nurmi, H.1    Salomaa, A.2
  • 145
    • 84956974327 scopus 로고    scopus 로고
    • Receipt-free electronic voting schemes for large scale elections
    • Christianson, B., B. Crispo, T.M.A. Lomas and M. Roe (Eds.). Springer-Verlag, Berlin Heidelberg
    • Okamoto, T., 1998. Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Security Protocols, Christianson, B., B. Crispo, T.M.A. Lomas and M. Roe (Eds.). Springer-Verlag, Berlin Heidelberg, pp:25-35.
    • (1998) Security Protocols , pp. 25-35
    • Okamoto, T.1
  • 146
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (Ed.). Springer-Verlag, BerlinHeidelberg
    • Paillier, P., 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Advances in Cryptology-EUROCRYPT '99, Stern, J. (Ed.). Springer-Verlag, BerlinHeidelberg, pp: 223-238.
    • (1999) Advances in Cryptology-EUROCRYPT '99 , pp. 223-238
    • Paillier, P.1
  • 148
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C., 1998. The inductive approach to verifying cryptographic protocols. J. Comput. Security, 6: 85-128.
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 149
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party (extended abstract)
    • Davies, D.W. (Ed.). Springer-Verlag, Berlin Heidelberg
    • Pedersen, T.P., 1991. A Threshold Cryptosystem without a Trusted Party (Extended abstract). In: Advances in Cryptology-EUROCRYPT 91, Davies, D.W. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 522-526.
    • (1991) Advances in Cryptology-EUROCRYPT 91 , pp. 522-526
    • Pedersen, T.P.1
  • 151
    • 84948967487 scopus 로고
    • Breaking an efficient anonymous channel
    • De Santis A. (Ed.). Springer-Verlag, BerlinHeidelberg
    • Pfitzmann, B., 1995. Breaking an Efficient Anonymous Channel. In: Advances in Cryptology-Eurocrypt '94, De Santis A. (Ed.). Springer-Verlag, BerlinHeidelberg, pp: 332-340.
    • (1995) Advances in Cryptology-Eurocrypt '94 , pp. 332-340
    • Pfitzmann, B.1
  • 155
    • 33749663619 scopus 로고    scopus 로고
    • Master Thesis. Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University, Bratislava
    • Rjajjskov'a, Z., 2002. Electronic voting schemes. Master Thesis. Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University, Bratislava.
    • (2002) Electronic Voting Schemes
    • Rjajjskov'a, Z.1
  • 156
    • 35048866464 scopus 로고    scopus 로고
    • An efficient strong designated verifier signature scheme
    • Lim, J.I. andD.H. Lee (Eds.). LNCS 2971, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-21376-5
    • Saeednia, S., S. Kremer and O. Markowitch, 2004. An Efficient Strong Designated Verifier Signature Scheme. In: Information Security and Cryptology-ICISC 2003, Lim, J.I. andD.H. Lee (Eds.). LNCS 2971, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-21376-5, pp: 40-54.
    • (2004) Information Security and Cryptology-ICISC 2003 , pp. 40-54
    • Saeednia, S.1    Kremer, S.2    Markowitch, O.3
  • 157
    • 84957356080 scopus 로고
    • Receipt-free mix-type voting scheme, A practical solution to the implementation of a voting booth
    • Springer-Verlag, Guillou, L.C. and J.J. Quisquater (Eds.), Springer-Verlag, Berlin Heidelberg
    • Sako, K. and J. Kilian, 1995. Receipt-Free Mix-Type Voting Scheme, A Practical Solution to the Implementation of a Voting Booth. In: Advances in Cryptology-EUROCRYPT '95, Springer-Verlag, Guillou, L.C. and J.J. Quisquater (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 393-403.
    • (1995) Advances in Cryptology-EUROCRYPT '95 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 158
    • 33644765913 scopus 로고    scopus 로고
    • A framework and taxonomy for comparison of electronic voting schemes
    • Sampigethaya, K. andR. Poovendran, 2006. A framework and taxonomy for comparison of electronic voting schemes. Comput. Security, 25: 136-153.
    • (2006) Comput. Security , vol.25 , pp. 136-153
    • Sampigethaya, K.1    Poovendran, R.2
  • 159
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A., 1979. How to share a secret. Commun. ACM, 22: 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 160
    • 2342455866 scopus 로고    scopus 로고
    • Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    • Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26: 449-454.
    • (2004) Comput. Standards Interfaces , vol.26 , pp. 449-454
    • Shao, Z.1
  • 161
    • 50249182033 scopus 로고    scopus 로고
    • Design and prototype of a coercion resistant, voter verifiable electronic voting system
    • October 2004, IEEE Xplore, London
    • Shubina, A.M. and S.W. Smith, 2004. Design and prototype of a coercion resistant, voter verifiable electronic voting system. Procedings of the Conference on Privacy, Security and Trust, October 2004, IEEE Xplore, London, pp: 29-39.
    • (2004) Procedings of the Conference on Privacy, Security and Trust , pp. 29-39
    • Shubina, A.M.1    Smith, S.W.2
  • 162
    • 69749098005 scopus 로고    scopus 로고
    • New cryptographic voting scheme with best-known theoretical properties
    • September 2005, Milan, Italy
    • Smith, W.D., 2005a. New cryptographic voting scheme with best-known theoretical properties. Proceedings of the Workshop on Frontiers in Electronic Elections, September 2005, Milan, Italy, pp: 1-14.
    • (2005) Proceedings of the Workshop on Frontiers in Electronic Elections , pp. 1-14
    • Smith, W.D.1
  • 167
    • 35048836270 scopus 로고    scopus 로고
    • Identity-based strong designated verifier signature schemes
    • Wang, H. at al. (Eds.). Springer-Verlag, Berlin Heidelberg
    • Susilo, W., F. Zhang and Y. Mu, 2004. Identity-Based Strong Designated Verifier Signature Schemes. In: Information Security and Privacy, Wang, H. at al. (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 313-324.
    • (2004) Information Security and Privacy , pp. 313-324
    • Susilo, W.1    Zhang, F.2    Mu, Y.3
  • 173
    • 61949473283 scopus 로고    scopus 로고
    • A survey of ring signature
    • Wang, L.L., G.Y. Zhang and C.G. Ma, 2007. A survey of ring signature. J. Commun., 28: 109-117.
    • (2007) J. Commun. , vol.28 , pp. 109-117
    • Wang, L.L.1    Zhang, G.Y.2    Ma, C.G.3
  • 176
    • 57849139755 scopus 로고    scopus 로고
    • A receipt-free punch-hole ballot electronic voting scheme
    • Dec. 16-18, IEEE Computer Society, Washington, DC
    • Wei, H., Z. Dong and C. Ke-fei, 2007. A receipt-free punch-hole ballot electronic voting scheme. Proceedings of the 3rd International IEEE Conference on Signal-Image Technologies and internet-Based System Dec. 16-18, IEEE Computer Society, Washington, DC, pp: 355-360.
    • (2007) Proceedings of the 3rd International IEEE Conference on Signal-image , pp. 355-360
    • Wei, H.1    Dong, Z.2    Ke-Fei, C.3
  • 177
    • 33746365152 scopus 로고    scopus 로고
    • An adaptively secure mix-vet without erasures
    • Bugliesi, M. et al. (Eds.). Springer Verlag, Berlin Heidelberg
    • Wikström, D. and J. Groth, 2006. An Adaptively Secure Mix-Net without Erasures. In: Automata, Languages and Programming, Bugliesi, M. et al. (Eds.). Springer Verlag, Berlin Heidelberg, pp: 276-287.
    • (2006) Automata, Languages and Programming , pp. 276-287
    • Wikström, D.1    Groth, J.2
  • 178
    • 35048873776 scopus 로고    scopus 로고
    • A universally composable mix-net
    • Maor, M. (Ed.). Springer Verlag, Berlin Heidelberg
    • Wikström, D., 2004a. A Universally Composable Mix-Net. In: Theory of Cryptography, Maor, M. (Ed.). Springer Verlag, Berlin Heidelberg, pp: 317-335.
    • (2004) Theory of Cryptography , pp. 317-335
    • Wikström, D.1
  • 179
    • 35048848969 scopus 로고    scopus 로고
    • Five practical attacks for optimistic mixing for exit-polls
    • Aug. 14-15, Ottawa, Canada
    • Wikström, D., 2004b. Five practical attacks for optimistic mixing for exit-polls. Proceedings of the 10th Annual International Workshop, Aug. 14-15, Ottawa, Canada, pp: 160-175.
    • (2004) Proceedings of the 10th Annual International Workshop , pp. 160-175
    • Wikström, D.1
  • 180
    • 33646794034 scopus 로고    scopus 로고
    • A sender verifiable mix-net and a new proof of a shuffle
    • Roy, B. (Ed.). Springer Verlag, Berlin Heidelberg
    • Wikström, D., 2005. A Sender Verifiable Mix-Net and a New Proof of a Shuffle. In: Advances in Cryptology-ASIACRYPT 2005, Roy, B. (Ed.). Springer Verlag, Berlin Heidelberg, pp: 273.
    • (2005) Advances in Cryptology-ASIACRYPT 2005 , vol.273
    • Wikström, D.1
  • 181
    • 65249187757 scopus 로고    scopus 로고
    • A new efficient on-line/offline threshold signature scheme
    • Wu, C.H. andX.F. Chen, 2009. A new efficient on-line/offline threshold signature scheme. Chinese J. Elect., 18: 321-324.
    • (2009) Chinese J. Elect. , vol.18 , pp. 321-324
    • Wu, C.H.1    Chen, X.F.2
  • 186
    • 33745211009 scopus 로고    scopus 로고
    • Cryptanalysis of a suite of deniable authentication protocols
    • Zhu, R.W., D.S. Wong and C.H. Lee, 2006. Cryptanalysis of a suite of deniable authentication protocols. IEEE Commun. Lett., 10: 504-506.
    • (2006) IEEE Commun. Lett. , vol.10 , pp. 504-506
    • Zhu, R.W.1    Wong, D.S.2    Lee, C.H.3
  • 187
    • 33846586500 scopus 로고    scopus 로고
    • A light-weight e-voting system with distributed trust
    • Zwierko, A. and Z. Kotulski, 2007. A light-weight e-voting system with distributed trust. Elect. Notes Theor. Comput. Sci., 168:
    • (2007) Elect. Notes Theor. Comput. Sci. , vol.168 , pp. 109-126
    • Zwierko, A.1    Kotulski, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.