-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M. and A.D. Gordon, 1999. A calculus for cryptographic protocols: The spi calculus. Inform. Comput., 148: 1-70.
-
(1999)
Inform. Comput.
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0035035153
-
Mobile values, new names and secure communication
-
London, UK., March 2001, ACM New York, USA
-
Abadi, M. and C. Fournet, 2001. Mobile values, new names and secure communication. Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, London, UK., March 2001, ACM New York, USA., pp: 104-115.
-
(2001)
Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
84957715741
-
Universally verifiable mix-net with verification work independent of the number of mix-centers
-
Abe, M., 1998. Universally verifiable mix-net with verification work independent of the number of mix-centers. Eurocrypt '98, pp: 437-447.
-
(1998)
Eurocrypt '98
, pp. 437-447
-
-
Abe, M.1
-
4
-
-
63449118333
-
Flaws in some robust optimistic mix-nets
-
Jul.9-11, Wollongong, Australia
-
Abe, M. and H. Imai, 2003. Flaws in some robust optimistic mix-nets. Proceedings of the 8th Australasian Conference on Information Security and Privacy, Jul. 9-11, Wollongong, Australia, pp: 39-50.
-
(2003)
Proceedings of the 8th Australasian Conference on Information Security and Privacy
, pp. 39-50
-
-
Abe, M.1
Imai, H.2
-
5
-
-
34548171199
-
Receipt-free homomorphic elections and write-in voter verified ballots
-
May 2, 2004 and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004
-
Acquisti, A., 2004. Receipt-free homomorphic elections and write-in voter verified ballots. Technical Report 2004/105, International Association for Cryptologic Research, May 2, 2004 and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004. http://www.heinz.cmu.edu/ ~acquisti/ papers/acquisti-.
-
(2004)
Technical Report 2004/105, International Association for Cryptologic Research
-
-
Acquisti, A.1
-
6
-
-
38049032820
-
How to shuffle in public
-
Feb. 21-24, Amsterdam, The Netherlands
-
Adida, B. and D. Wikstrom, 2007. How to shuffle in public. Proceedings of the 4th Theory of Cryptography Conference, Feb. 21-24, Amsterdam, The Netherlands, pp: 555-574.
-
(2007)
Proceedings of the 4th Theory of Cryptography Conference
, pp. 555-574
-
-
Adida, B.1
Wikstrom, D.2
-
7
-
-
33750277385
-
An efficient mixnet-based voting scheme providing receipt-freeness
-
Aditya, R., B. Lee, C. Boyd and E. Dawson, 2004. An efficient mixnet-based voting scheme providing receipt-freeness. Lecture Notes Comput. Sci., 3184: 152-161.
-
(2004)
Lecture Notes Comput. Sci.
, vol.3184
, pp. 152-161
-
-
Aditya, R.1
Lee, B.2
Boyd, C.3
Dawson, E.4
-
11
-
-
35048873387
-
Identity-based chameleon hash and applications
-
Juels, A. (Ed.), Springer Verlag, Berlin Heidelberg, 978-3-540-22420
-
Ateniese, G. and B. Medeiros, 2004. Identity-Based Chameleon Hash and Applications. In: Financial Cryptography, Juels, A. (Ed.). Springer Verlag, Berlin Heidelberg, 978-3-540-22420, pp: 164-180.
-
(2004)
Financial Cryptography
, pp. 164-180
-
-
Ateniese, G.1
Medeiros, B.2
-
13
-
-
51749097575
-
Automated verification of remote electronic voting protocols in the applied Pi-calculus
-
Jun. 23-25, IEEE Computer Society, Washington, DC
-
Backes, M., C. Hritcu and M. Maffei, 2008. Automated verification of remote electronic voting protocols in the applied Pi-calculus. Proceedings of the 21st IEEE Computer Security Foundations Symposium, Jun. 23-25, IEEE Computer Society, Washington, DC, pp: 195-209.
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium
, pp. 195-209
-
-
Backes, M.1
Hritcu, C.2
Maffei, M.3
-
14
-
-
33646817427
-
Universal designated signature proof (or how to efficiently prove the knowledge of a signature)
-
Roy, B. (Ed.). Springer-Verlag, Berlin Heidelberg
-
Baek, J., R. Safavi-Naini and W. Susilo, 2005. Universal Designated Signature Proof (or How to Efficiently Prove the Knowledge of a Signature). In: Advances inCryptology-ASIACRYPT, Roy, B. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 644-661.
-
(2005)
Advances in Cryptology-ASIACRYPT
, pp. 644-661
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
15
-
-
58449096556
-
Knowledge-based modelling of voting protocols
-
Jun.25-27, Brussels, Belgium
-
Baskar, A., R. Ramanujam and S.P. Suresh, 2007. Knowledge-based modelling of voting protocols. Proceedings of the 11th Conference on theoretical Aspects of Rationality and Knowledge, Jun. 25-27, Brussels, Belgium, pp: 62-71.
-
(2007)
Proceedings of the 11th Conference on theoretical Aspects of Rationality and Knowledge
, pp. 62-71
-
-
Baskar, A.1
Ramanujam, R.2
Suresh, S.P.3
-
16
-
-
0034771832
-
Practical multi-candidate election system
-
ACM, New York, USA
-
Baudron, O., P. A. Fouque, D. Pointcheval, G. Poupard and S. Jacques, 2001. Practical multi-candidate election system. Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, 2001, ACM, New York, USA., pp: 274-283.
-
(2001)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, 2001
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.A.2
Pointcheval, D.3
Poupard, G.4
Jacques, S.5
-
17
-
-
40349089019
-
Perfectly-secure MPC with linear communication complexity
-
Canetti, R. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Beerliova, Z. and M. Hirt, 2008. Perfectly-Secure MPC with Linear Communication Complexity. In: Theory of Cryptography, Canetti, R. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 213-230.
-
(2008)
Theory of Cryptography
, pp. 213-230
-
-
Beerliova, Z.1
Hirt, M.2
-
18
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
May 02-04, Chicago, Illinois, United States
-
Ben-Or, M., S. Goldwasser and A. Wigderson, 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. Proceedings of the 20th Annual ACM Symposium on Theory of Computing, May 02-04, Chicago, Illinois, United States, pp: 1-10.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
19
-
-
0028087488
-
Receipt-free secret-ballot elections (extended abstract)
-
May 23-25, Montreal, Quebec, Canada
-
Benaloh, J. and D. Tuinstra, 1994. Receipt-free secret-ballot elections (extended abstract). Proceedings of the 26th Annual ACM Symposium on theory of Computing, May 23-25, Montreal, Quebec, Canada, pp: 544-553.
-
(1994)
Proceedings of the 26th Annual ACM Symposium on Theory of Computing
, pp. 544-553
-
-
Benaloh, J.1
Tuinstra, D.2
-
20
-
-
33745561884
-
Ring signatures: Stronger definitions and constructions without random oracles
-
Halevi, S. and T Rabin (Eds.). Springer-Verlag, Berlin Heidelberg
-
Bender, A., J. Katz and R. Morselli, 2006. Ring Signatures: Stronger Definitions and Constructions Without Random Oracles. In: Theory of Cryptography, Halevi, S. and T Rabin (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 60-79.
-
(2006)
Theory of Cryptography
, pp. 60-79
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
21
-
-
64249149755
-
Ring signatures: Stronger definitions and constructions without random oracles
-
Bender, A., J. Katz and R Morselli, 2009. Ring signatures: Stronger definitions and constructions without random oracles. J. Cryptol., 22: 114-138.
-
(2009)
J. Cryptol.
, vol.22
, pp. 114-138
-
-
Bender, A.1
Katz, J.2
Morselli, R.3
-
22
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Jun. 11-13, IEEE Computer Society, Washington, DC
-
Blanchet, B., 2001. An efficient cryptographic protocol verifier based on prolog rules. Proceedings of the 14th IEEE Workshop on Computer Security Foundations, Jun. 11-13, IEEE Computer Society, Washington, DC, pp: 82-96.
-
(2001)
Proceedings of the 14th IEEE Workshop on Computer Security Foundations
, pp. 82-96
-
-
Blanchet, B.1
-
23
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
Blum, M. and S. Micali, 1984. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput, 13: 850-864.
-
(1984)
SIAM J. Comput
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
24
-
-
51849143985
-
-
Bogetoft, P., D.L. Christensen, I. Damgard, M. Geisler and T. Jakobsen et at, 2008. Secure multiparty computation goes live. *http://eprint.iacr. org/2008/068.pdf.
-
(2008)
Secure Multiparty Computation Goes Live
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.5
-
25
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham, E. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Boneh, D., C. Gentry, B. Lynn and H. Shacham, 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Advance in Cryptology-Eurocrypt 2003, Biham, E. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 416-423.
-
(2003)
Advance in Cryptology-Eurocrypt 2003
, pp. 416-423
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
26
-
-
84884384634
-
-
Department of Computer Science, The Johns Hopkins University
-
Bungale, P. and S. Sridhar, 2003. Electronic voting a survey. Department of Computer Science, The Johns Hopkins University.
-
(2003)
Electronic Voting a Survey
-
-
Bungale, P.1
Sridhar, S.2
-
30
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (Ed.). Springer-Verlag, Berlin Heidelberg
-
Camenisch, J. and A. Lysyanskaya, 2004. Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Advances in Cryptology-CRYPTO 2004, Franklin, M. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 56-72.
-
(2004)
Advances in Cryptology-CRYPTO 2004
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
31
-
-
0030416397
-
Incoercible multiparty computation
-
Oct. 14-16, Burlington, VT, USA
-
Canetti, R. andR. Gennaro, 1996. Incoercible multiparty computation. Proceedings of the 37th Annual Symposium on Foundations of Computer Science, Oct. 14-16, Burlington, VT, USA., pp: 504-513.
-
(1996)
Proceedings of the 37th Annual Symposium on Foundations of Computer Science
, pp. 504-513
-
-
Canetti, R.1
Gennaro, R.2
-
32
-
-
84958626761
-
Deniable encryption
-
Aug. 17-21, Springer-Verlag, London
-
Canetti, R., C. Dwork, M. Naor and R. Ostrovsky, 1997. Deniable encryption. Proceedings of the 17th Annual international Cryptology Conference on Advances in Cryptology, Aug. 17-21, Springer-Verlag, London, pp: 90-104.
-
(1997)
Proceedings of the 17th Annual international Cryptology Conference on Advances in Cryptology
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
33
-
-
33749458214
-
Provably secure robust threshold partial blind signature
-
Cao, Z.F., H.J. Zhu and R.X. Lu, 2006. Provably secure robust threshold partial blind signature. Sci. China Ser. F: Inform. Sci., 49: 604-615.
-
(2006)
Sci. China Ser. F: Inform. Sci.
, vol.49
, pp. 604-615
-
-
Cao, Z.F.1
Zhu, H.J.2
Lu, R.X.3
-
35
-
-
33744970314
-
An anonymous voting mechanism based on the key exchange protocol
-
Chang, C.C. and J.S. Lee, 2006. An anonymous voting mechanism based on the key exchange protocol. Comput. Security, 25: 307-314.
-
(2006)
Comput. Security
, vol.25
, pp. 307-314
-
-
Chang, C.C.1
Lee, J.S.2
-
36
-
-
0019532104
-
Untraceable electronic mail return addresses and digital pseudonyms
-
Chaum, D.L., 1981. Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM, 24: 84-88.
-
(1981)
Commun. ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.L.1
-
37
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D., 1985. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28: 1030-1044.
-
(1985)
Commun. ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
38
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
May 02-04, Chicago, Illinois, United States
-
Chaum, D., C. Crépeauandl. Damgard, 1988. Multiparty unconditionally secure protocols. Proceedings of the 20th Annual ACM Symposium on Theory of Computing, May 02-04, Chicago, Illinois, United States, pp: 11-19.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
39
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
Damgard, LB. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Chaum, D., 1990. Zero-Knowledge Undeniable Signatures. In: Advances in Cryptology-Eurocrypt '90, Damgard, LB. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 458-464.
-
(1990)
Advances in Cryptology-Eurocrypt '90
, pp. 458-464
-
-
Chaum, D.1
-
40
-
-
0010252194
-
Undeniable signatures
-
Brassard, G. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Chaum, D. and H. Van Antwerpen, 1990. Undeniable Signatures. In: Advances in Cryptology Crypto'89, Brassard, G. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 212-216.
-
(1990)
Advances in Cryptology Crypto'89
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
41
-
-
33646745945
-
-
United States Patent 5, 493, 614
-
Chaum, D., 1996. Private signature and proof systems. United States Patent 5, 493, 614. http://www.google. com/patents?hl=zh-CN&lr=&vid= USPAT5493614&id=Q4keAAAAEBAJ&oi=fnd.
-
(1996)
Private Signature and Proof Systems
-
-
Chaum, D.1
-
42
-
-
0001604533
-
Blind signatures for untraceable payments
-
LNCS1440, CRYPTO'82, Springer-Verlag, London
-
Chaum, D., 1998. Blind signatures for untraceable payments. Proceedings of the Advances in Cryptology, LNCS1440, CRYPTO'82, Springer-Verlag, London, pp: 199-203.
-
(1998)
Proceedings of the Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
44
-
-
2342617507
-
Secret-ballot receipts: True voter-verifiable elections
-
Chaum, D., 2004. Secret-ballot receipts: True voter-verifiable elections. IEEE Security Privacy, 2: 38-47.
-
(2004)
IEEE Security Privacy
, vol.2
, pp. 38-47
-
-
Chaum, D.1
-
45
-
-
55349092367
-
A new receipt-free voting scheme based on linkable ring signature for designated verifiers
-
Jul. 29-31, IEEE Computer Society, Washington, DC
-
Chen, G., C. Wu, W. Han, X. Chen, H. Lee and K. Kim, 2008. A new receipt-free voting scheme based on linkable ring signature for designated verifiers. Proceedings of the 2008 international Conference on Embedded Software and Systems Symposia, Jul. 29-31, IEEE Computer Society, Washington, DC, pp: 18-23.
-
(2008)
Proceedings of the 2008 Iternational Conference on Embedded Software and Systems Symposia
, pp. 18-23
-
-
Chen, G.1
Wu, C.2
Han, W.3
Chen, X.4
Lee, H.5
Kim, K.6
-
46
-
-
38349013711
-
A framework for automatically checking anonymity with μCRL
-
Montanari, U. D. Sannella and R. Bruni (Eds.). Springer-Verlag, Berlin Heidelberg
-
Chothia, T., S. Orzan, J. Pang and M.T. Dashti, 2007. A Framework for Automatically Checking Anonymity with μCRL. In: Trustworthy Global Computing, Montanari, U. D. Sannella and R. Bruni (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 301-318.
-
(2007)
Trustworthy Global Computing
, pp. 301-318
-
-
Chothia, T.1
Orzan, S.2
Pang, J.3
Dashti, M.T.4
-
47
-
-
38549140171
-
Short ballot assumption and three ballot voting protocol
-
Geffert V. et al (Eds.). Springer-Verlag, Berlin Heidelberg
-
Cichon, J., M. Kutylowski and B. Glor^ 2008. Short Ballot Assumption and Three ballot Voting Protocol. In: SOFSEM 2008: Theory and Practice of Computer Science, Geffert, V. et al (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 585-598.
-
(2008)
SOFSEM 2008: Theory and Practice of Computer Science
, pp. 585-598
-
-
Cichon, J.1
Kutylowski, M.2
Glorz, B.3
-
49
-
-
69749084400
-
Civitas: A secure remote voting system
-
May, 2007
-
Clarkson, M., S. Chong and A.C. Myers, 2007. Civitas: A secure remote voting system. Technical Report, Cornell University Computing and Information Science Technology Report, May, 2007. http://drops.dagstuhl.de/opus/volltexte/ 2008/1296/.
-
(2007)
Technical Report, Cornell University Computing and Information Science Technology Report
-
-
Clarkson, M.1
Chong, S.2
Myers, A.C.3
-
50
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Aug. 21-25, IEEE Xplore, London
-
Cramer, R., I. Damgard and B. Schoenmakers, 1994. Proofs of partial knowledge and simplified design of witness hiding protocols. Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, Aug. 21-25, IEEE Xplore, London, pp: 174-187.
-
(1994)
Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
, pp. 174-187
-
-
Cramer, R.1
Damgard, I.2
Schoenmakers, B.3
-
51
-
-
84957375076
-
A Secure and Optimally Efficient Multi-Authority Election Scheme
-
Advances in Cryptology - Eurocrypt '97
-
Cramer, R., R. Gennaro and B. Schoenmakers, 1997. A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Trustworthy Global Computing, Fumy, W. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 103-118. (Pubitemid 127067797)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
53
-
-
84976671974
-
Cryptographic protocols
-
May 05-07, San Francisco, California, United States
-
DeMillo, R.A., N.A. Lynch and M.J. Merritt, 1982. Cryptographic protocols. Proceedings of the 14th Annual ACM Symposium on theory of Computing, May 05-07, San Francisco, California, United States, pp: 383-400.
-
(1982)
Proceedings of the 14th Annual ACM Symposium on Theory of Computing
, pp. 383-400
-
-
DeMillo, R.A.1
Lynch, N.A.2
Merritt, M.J.3
-
55
-
-
33947622187
-
Coercion-resistance and receipt-freeness in electronic voting protocol
-
July 5-7, Venice, Italy
-
Delaune, S., S. Kremer andM.D. Ryan, 2006a. Coercion-resistance and receipt-freeness in electronic voting protocol. Proceedings of 19th IEEE Computer Security Foundations Workshop, July 5-7, Venice, Italy, pp: 28-42
-
(2006)
Proceedings of 19th IEEE Computer Security Foundations Workshop
, pp. 28-42
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
58
-
-
84958770476
-
Weakness of undeniable signature schemes
-
Davies D.E. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Desmedt, Y. andM. Yung, 1991. Weakness of Undeniable Signature Schemes. In: Advances in Cryptology EUROCRYPT '91, Davies D.E. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 205-220.
-
(1991)
Advances in Cryptology EUROCRYPT '91
, pp. 205-220
-
-
Desmedt, Y.1
Yung, M.2
-
59
-
-
84948958135
-
How to break a practical MIX and design a new one
-
Preneel, B. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Desmedt, Y. and K. Kurosawa, 2000. How to Break a Practical MIX and Design a New One. In: Advances inCiyptology-EUROCRYPT 2000, Preneel, B. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 557-572.
-
(2000)
Advances in Ciyptology-EUROCRYPT 2000
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
60
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D. and A.C. Yao, 1983. On the security of public key protocols. IEEE Trans. Inform. Theor., 29: 198-208.
-
(1983)
IEEE Trans. Inform. Theor.
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
61
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Sept. 10-13, Cloudcroft, New Mexico
-
Du, W. and M.J. Atallah, 2001. Secure multi-party computation problems and their applications: A review and open problems. Proceedings of the 2001 Workshop on New Security Paradigms, Sept. 10-13, Cloudcroft, New Mexico, pp: 13-22.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
62
-
-
0031632567
-
Concurrent zero-knowledge
-
USA
-
Dwork, C, M. Naor and A. Sahai, 1998. Concurrent zero-knowledge. Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998, USA., pp: 409-418.
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing, 1998
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
63
-
-
52949134446
-
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
-
Fan, C.I. and W.Z. Sun, 2008. An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Math. Comput. Modell, 48: 1611-1627.
-
(2008)
Math. Comput. Modell
, vol.48
, pp. 1611-1627
-
-
Fan, C.I.1
Sun, W.Z.2
-
64
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
Fan, L., C.X. Xu and J.H. Li, 2002. Deniable authentication protocol based on Diffie-Hellman algorithm. Elect. Lett, 38: 705-706.
-
(2002)
Elect. Lett.
, vol.38
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
65
-
-
37349038164
-
Universally composable security concurrent deniable authentication based on witness indistinguishable
-
Feng, T. and J.F. Ma, 2007. Universally composable security concurrent deniable authentication based on witness indistinguishable. J. Software, 18: 2871-2881.
-
(2007)
J. Software
, vol.18
, pp. 2871-2881
-
-
Feng, T.1
Ma, J.F.2
-
66
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
Dec. 13-16, Springer-Verlag London, UK
-
Fujioka, A., T. Okamoto and K. Ohta, 1992. A practical secret voting scheme for large scale elections. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, Dec. 13-16, Springer-Verlag London, UK., pp: 244-251.
-
(1992)
Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
67
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
Aug.19-23, Springer-Verlag, London, UK
-
Furukawa, J. and K. Sako, 2001. An efficient scheme for proving a shuffle. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Aug. 19-23, Springer-Verlag, London, UK., pp: 368-387.
-
(2001)
Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
69
-
-
35248865251
-
Invisibility and anonymity of undeniable and confirmer signatures
-
Apr. 13-17, San Francisco, CA, USA
-
Galbraifh, S. and W. Mao, 2003. Invisibility and anonymity of undeniable and confirmer signatures. Proceedings of the Cryptographers' Track at the RSA Conference 2003, Apr. 13-17, San Francisco, CA, USA., pp: 80-97.
-
(2003)
Proceedings of the Cryptographers' Track at the RSA Conference 2003
, pp. 80-97
-
-
Galbraifh, S.1
Mao, W.2
-
70
-
-
37749037987
-
Anew(t, N-2) resilience mix net
-
Gao, H.M., X.F. Chen and Y.M. Wang, 2003. Anew(t, N-2) resilience mix net. Chinese J. Comput, 26: 1361-1365.
-
(2003)
Chinese J. Comput
, vol.26
, pp. 1361-1365
-
-
Gao, H.M.1
Chen, X.F.2
Wang, Y.M.3
-
71
-
-
0031628398
-
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
-
Jun. 28-July 02, Puerto Vallarta, Mexico
-
Gennaro, R., M.O. Rabin and T. Rabin, 1998. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. Proceedings of the 70th Annual ACM Symposium on Principles of Distributed Computing, Jun. 28-July 02, Puerto Vallarta, Mexico, pp: 101-111.
-
(1998)
Proceedings of the 70th Annual ACM Symposium on Principles of Distributed Computing
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
72
-
-
0023545076
-
How to play any mental game-a completeness theorem for protocols with honest majority
-
New York, USA
-
Goldreich, O., S. Micali and A. Wigderson, 1987. How to play any mental game-a completeness theorem for protocols with honest majority. Proceedings of the 19th ACM Symposium on the Theory of Computing, 1987, New York, USA., pp: 218-229.
-
(1987)
Proceedings of the 19th ACM Symposium on the Theory of Computing, 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
73
-
-
84958742387
-
Optimistic mixing for exit-polls
-
Dec. 01-05, Springer-Verlag, London, UK
-
Golle, P., S. Zhong, D. Boneh, M. Jakobsson and A. Juels, 2002. Optimistic mixing for exit-polls. Proceedings of the 8th international Conference on the theory and Application of Cryptology and information Security: Advances in Cryptology, Dec. 01-05, Springer-Verlag, London, UK., pp: 451-465.
-
(2002)
Proceedings of the 8th international Conference on the theory and Application of Cryptology and information Security: Advances in Cryptology
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
75
-
-
0030703956
-
Provable security for cryptographic protocols-exact analysis and engineering applications
-
IEEE Xplore, London
-
Gray, J.W., K.F. Epsilon and K.S. Lui, 1997. Provable security for cryptographic protocols-exact analysis and engineering applications. Proceedings of the 10th IEEE Computer Security Foundations Workshop, 1997, IEEE Xplore, London, pp: 45-58.
-
(1997)
Proceedings of the 10th IEEE Computer Security Foundations Workshop, 1997
, pp. 45-58
-
-
Gray, J.W.1
Epsilon, K.F.2
Lui, K.S.3
-
76
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
Jan. 06-08, Springer-Verlag London, UK
-
Groth, J., 2003. A verifiable secret shuffle of homomorphic encryptions. Proceedings of the 6th International Workshop on theory and Practice in Public Key Cryptography: Public Key Cryptography, Jan. 06-08, Springer-Verlag London, UK., pp: 145-160.
-
(2003)
Proceedings of the 6th International Workshop on theory and Practice in Public Key Cryptography: Public Key Cryptography
, pp. 145-160
-
-
Groth, J.1
-
77
-
-
35048844767
-
Evaluating security of voting schemes in the universal composability framework
-
Jakobsson, M., M. Yung and J. Zhou (Eds.). Springer-Verlag, Berlin Heidelberg
-
Groth, J., 2004. Evaluating Security of Voting Schemes in the Universal Composability Framework. In: Applied Cryptography and Network Security, Jakobsson, M., M. Yung and J. Zhou (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 46-60.
-
(2004)
Applied Cryptography and Network Security
, pp. 46-60
-
-
Groth, J.1
-
78
-
-
78651377249
-
Deniable authentication protocol resisting man-in-the-middle attack
-
Jan. 2005, PWASET
-
Han, S., W.Q. Liu and E. Chang, 2005. Deniable authentication protocol resisting man-in-the-middle attack. Proceedings of world Academy of Science, Engineering and Technology, Jan. 2005, PWASET, pp:l-4.
-
(2005)
Proceedings of world Academy of Science, Engineering and Technology
-
-
Han, S.1
Liu, W.Q.2
Chang, E.3
-
81
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
May 14-18, Bruges, Belgium
-
Hirt, M. and K. Sako, 2000. Efficient receipt-free voting based on homomorphic encryption. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, May 14-18, Bruges, Belgium, pp: 539-556.
-
(2000)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
82
-
-
35248861868
-
Efficient secure multiparty computation
-
Okamoto, T. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Hirt, M., U. Maurer and B. Przydatek, 2000. Efficient Secure Multiparty Computation. In: Advances in Cryptology-ASIACRYPT 2000, Okamoto, T. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 143-161.
-
(2000)
Advances in Cryptology-ASIACRYPT 2000
, pp. 143-161
-
-
Hirt, M.1
Maurer, U.2
Przydatek, B.3
-
83
-
-
33749561443
-
Robust multiparty computation with linear communication complexity
-
Springer-Verlag, Berlin Heidelberg
-
Hirt M. and J.B. Nielsen, 2006. Robust Multiparty Computation with Linear Communication Complexity. In: Advance in Cryptilogy-CRYPTO 2006, Springer-Verlag, Berlin Heidelberg, pp: 463-482.
-
(2006)
Advance in Cryptilogy-CRYPTO 2006
, pp. 463-482
-
-
Hirt, M.1
Nielsen, J.B.2
-
85
-
-
49549102632
-
Short designated verifier signature scheme and its identity-based variant
-
Huang, X.Y., W. Susilo, Y. Mu and F. Zhang, 2008. Short designated verifier signature scheme and its identity-based variant. Int. J. Network Security, 6: 82-93.
-
(2008)
Int. J. Network Security
, vol.6
, pp. 82-93
-
-
Huang, X.Y.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
86
-
-
33745926003
-
RIES-internet voting in action
-
Jul. 26-28, IEEE Computer Society, Washington DC
-
Hubbers, R, B. Jacobs and W. Pieters, 2005. RIES-internet voting in action. Proceedings of the 29th Annual International Computer Software and Applications Conference, Jul. 26-28, IEEE Computer Society, Washington, DC, pp: 417-424.
-
(2005)
Proceedings of the 29th Annual International Computer Software and Applications Conference
, pp. 417-424
-
-
Hubbers, R.1
Jacobs, B.2
Pieters, W.3
-
87
-
-
69749086390
-
A method for obtaining deniable public-key encryption
-
Ibrahim, M.H., 2009a. A method for obtaining deniable public-key encryption. Int. J. Network Security, 8: 1-9.
-
(2009)
Int. J. Network Security
, vol.8
, pp. 1-9
-
-
Ibrahim, M.H.1
-
88
-
-
69749087308
-
Receiver-deniable public-key encryption
-
Ibrahim, M.H., 2009b. Receiver-deniable public-key encryption. Int. J. Network Security, 8: 159-165.
-
(2009)
Int. J. Network Security
, vol.8
, pp. 159-165
-
-
Ibrahim, M.H.1
-
89
-
-
84927728020
-
Blackmailing using undeniable signatures
-
De Santis, A. (Ed), Springer-Verlag, Berlin Heidelberg
-
Jakobsson, M., 1994. Blackmailing Using Undeniable Signatures. In: Advances in Cryptology EUROCRYPT '94, De Santis, A. (Ed). Springer-Verlag, Berlin Heidelberg, pp: 425-427.
-
(1994)
Advances in Cryptology EUROCRYPT '94
, pp. 425-427
-
-
Jakobsson, M.1
-
90
-
-
84927752554
-
Designated verifier proofs and their applications
-
May 12-16, Saragossa, Spain
-
Jakobsson, M., K. Sako and R. Impagliazzo, 1996. Designated verifier proofs and their applications. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, May 12-16, Saragossa, Spain, pp: 143-154.
-
(1996)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
91
-
-
84957709438
-
A practical mix
-
May 31-Jun.4, Espoo, Finland
-
Jakobsson, M., 1998. A practical mix. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, May 31-Jun. 4, Espoo, Finland, pp: 448-461.
-
(1998)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques
, pp. 448-461
-
-
Jakobsson, M.1
-
92
-
-
0032650497
-
Flash mixing
-
May 04-06, Atlanta, Georgia, United States
-
Jakobsson, M., 1999. Flash mixing. Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, May 04-06, Atlanta, Georgia, United States, pp: 83-89.
-
(1999)
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing
, pp. 83-89
-
-
Jakobsson, M.1
-
93
-
-
84937417083
-
Mix and match: Secure function evaluation via ciphertexts
-
Dec. 03-07, Springer-Verlag, London
-
Jakobsson, M. and A. Juels, 2000. Mix and match: Secure function evaluation via ciphertexts. Proceedings of the 6th International Conference on the theory and Application of Cryptology and information Security: Advances in Cryptology, Dec. 03-07, Springer-Verlag, London, pp: 162-177.
-
(2000)
Proceedings of the 6th International Conference on the theory and Application of Cryptology and information Security: Advances in Cryptology
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
-
94
-
-
0034777803
-
An optimally robust hybrid mix network
-
Newport, Rhode Island, United States
-
Jakobsson, M. and A. Juels, 2001. An optimally robust hybrid mix network. Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing, 2001, Newport, Rhode Island, United States, pp: 284-292.
-
(2001)
Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing, 2001
, pp. 284-292
-
-
Jakobsson, M.1
Juels2
-
95
-
-
33750257357
-
Formalising receipt-freeness
-
Aug. 30-Sept.2 Samos Island, Greece
-
Jonker Hugo, L., V. de and P. Erik, 2006. Formalising Receipt-freeness. Proceedings of the 9th International Conference on Information Security, Aug. 30-Sept. 2, Samos Island, Greece, pp: 476-488.
-
(2006)
Proceedings of the 9th International Conference on Information Security
, pp. 476-488
-
-
Hugo, L.J.1
De, V.2
Erik, P.3
-
96
-
-
69749087787
-
Receipt-freeness as a special case of anonymity in epistemic logic
-
Jun 2006, Cambridge, UK
-
Jonker, H.L. and W. Pieters, 2006. Receipt-freeness as a special case of anonymity in epistemic logic. Proceedings of the IAVoSS Workshop On Trustworthy Elections, 29-30 Jun 2006, Cambridge, UK.
-
(2006)
Proceedings of the IAVoSS Workshop on Trustworthy Elections
, pp. 29-30
-
-
Jonker, H.L.1
Pieters, W.2
-
98
-
-
33749009810
-
Coercion-resistant electronic elections
-
Nov.07-07, Alexandria, VA, USA
-
Juels, A., D. Catalano and M. Jakobsson, 2005. Coercion-resistant electronic elections. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Nov. 07-07, Alexandria, VA, USA., pp: 61-70.
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 61-70
-
-
Juels, A.1
Catalano, D.2
Jakobsson, M.3
-
99
-
-
34547579290
-
Identity based strong designated verifier signature scheme
-
Kancharla, P., K. Gummadidala and S. Saxen, 2007. Identity based strong designated verifier signature scheme. Informatica, 18: 239-252.
-
(2007)
Informatica
, vol.18
, pp. 239-252
-
-
Kancharla, P.1
Gummadidala, K.2
Saxen, S.3
-
100
-
-
85077591735
-
Cryptographic voting protocols: A systems perspective
-
Baltimore, MD, Jul. 31-Aug. 05, USENIX Association, Berkeley, CA
-
Karlof, C., N. Sastry andD. Wagner, 2005. Cryptographic voting protocols: A systems perspective. Proceedings of the 14th Conference on USENIX Security Symposium-Vol. 14, Baltimore, MD, Jul. 31-Aug. 05, USENIX Association, Berkeley, CA, pp:l-17.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 1-17
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
101
-
-
3042598333
-
A sound logic for analysing electronic commerce protocols
-
Sept. 16-18, London, UK
-
Kessler, V. and H. Neumann, 1998. A sound logic for analysing electronic commerce protocols. Proceedings of the 5th European Symposium on Research in Computer Security, Sept. 16-18, London, UK., pp: 34-360.
-
(1998)
Proceedings of the 5th European Symposium on Research in Computer Security
, pp. 34-360
-
-
Kessler, V.1
Neumann, H.2
-
102
-
-
39049093283
-
An internet voting system supporting user privacy
-
Dec.11-15, IEEE Computer Society, Washington, DC
-
Kiayias, A., M. Korman and D. Walluck, 2006. An internet voting system supporting user privacy. Proceedings of the 22nd Annual Computer Security Applications Conference, Dec. 11-15, IEEE Computer Society, Washington, DC, pp: 165-174.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
, pp. 165-174
-
-
Kiayias, A.1
Korman, M.2
Walluck, D.3
-
103
-
-
38549145955
-
Practical deniable encryption
-
Jan. 19-25, Novy Smokovec, Slovakia
-
Klonowski, M., P. Kubiak and M. Kutylowsk, 2008. Practical deniable encryption. Proceedings of the 34th Conference on Current Trends in Theory and Practice of Computer Science, Jan. 19-25, Novy Smokovec, Slovakia, pp: 599-609.
-
(2008)
Proceedings of the 34th Conference on Current Trends in Theory and Practice of Computer Science
, pp. 599-609
-
-
Klonowski, M.1
Kubiak, P.2
Kutylowsk, M.3
-
104
-
-
70350441588
-
An epistemic approach to coercion-resistance for electronic voting protocols
-
IEEE Computer Society
-
Kousters, R. and T. Truderung, 2009. An epistemic approach to coercion-resistance for electronic voting protocols. IEEE Symposium on Security and Privacy, IEEE Computer Society.
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Kousters, R.1
Truderung, T.2
-
105
-
-
84959444946
-
Chameleon signature
-
Feb. 3-4, San Diego, CA, USA
-
Krawczyk, H. and T. Rabin, 2000. Chameleon signature. Proceedings of the Symposium on Network and Distributed Systems Security, Feb. 3-4, San Diego, CA, USA., pp: 143-154.
-
(2000)
Proceedings of the Symposium on Network and Distributed Systems Security
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
106
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied Pi calculus
-
Kremer S. and M.D. Ryan, 2005. Analysis of an electronic voting protocol in the applied Pi calculus. Lect. Notes Comput. Sci., 3444: 186-200.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
107
-
-
35048878760
-
Multi-designated verifiers signatures
-
Lopez, J., S. Qing and E. Okamoto (Eds.), Spring er-Verlag, Berlin Heidelberg
-
Laguillaumie, F. andD. Vergnaud, 2004. Multi-Designated Verifiers Signatures. In: Information and Communi Cations Security, Lopez, J., S. Qing and E. Okamoto (Eds.). Spring er-Verlag, Berlin Heidelberg, pp: 495-507.
-
(2004)
Information and Communications Security
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
109
-
-
33750008172
-
Universal designated verifier signatures without random oracles or non-black box assumptions
-
De Prisco, R. and M. Yung (Eds.). Springer-Verlag, Berlin Heidelberg
-
Laguillaumie, F., B. Libert and J.J. Quisquater, 2006. Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box Assumptions. In: Security and Cryptography for Networks, De Prisco, R. and M. Yung (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 63-77.
-
(2006)
Security and Cryptography for Networks
, pp. 63-77
-
-
Laguillaumie, F.1
Libert, B.2
Quisquater, J.J.3
-
110
-
-
78651561491
-
-
Lee, B., C.Boyd, E.Dawson, K.Kim, J.Yang and S. Yoo, 2003. Providing receipt-freeness in mixnet-based voting protocols. http://caislab.icu.ac.kr/ Paper/paper-files/2003/ICISC03/mnvotmg-fmal-icisc20.pdf.
-
(2003)
Providing Receipt-freeness in Mixnet-Based Voting Protocols
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
111
-
-
67651030027
-
Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring
-
Lee, J.S. and J.H. Chang, 2006. Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring. Int. J. Comput. Sci. Network Security, 6: 205-210.
-
(2006)
Int. J. Comput. Sci. Network Security
, vol.6
, pp. 205-210
-
-
Lee, J.S.1
Chang, J.H.2
-
112
-
-
33845950814
-
A novel deniable authentication protocol using generalized ElGamal signature scheme
-
Lee, W.B., C.C. Wu and W.J. Tsaur, 2007. A novel deniable authentication protocol using generalized ElGamal signature scheme. Inform. Sci., 177: 1376-1381.
-
(2007)
Inform. Sci.
, vol.177
, pp. 1376-1381
-
-
Lee, W.B.1
Wu, C.C.2
Tsaur, W.J.3
-
114
-
-
37749040626
-
Cryptanalysis of a (t, N-2) resilient mix net
-
Li, L.H., S.F. Fu and G.Z. Xiao, 2007. Cryptanalysis of a (t, N-2) resilient Mix Net. J. Xidian Univ., 34: 926-934.
-
(2007)
J. Xidian Univ.
, vol.34
, pp. 926-934
-
-
Li, L.H.1
Fu, S.F.2
Xiao, S.F.3
-
115
-
-
35048866374
-
Identity based undeniable signatures
-
CT-RSA 2004, Springer-Verlag, Berlin Heidelberg
-
Libert, B. and J.J. Quisquater, 2004. Identity Based Undeniable Signatures. In: Topics in Cryptology, CT-RSA 2004, Springer-Verlag, Berlin Heidelberg, pp: 112-125.
-
(2004)
Topics in Cryptology
, pp. 112-125
-
-
Libert, B.1
Quisquater, J.J.2
-
117
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
Nov. 02-05, San Francisco, California, United States
-
Lincoln, P., J. Mitchell, M. Mitchell and A. Scedrov, 1998. A probabilistic poly-time framework for protocol analysis. Proceedings of the 5th ACM Conference on Computer and Communications Security, Nov. 02-05, San Francisco, California, United States, pp: 112-121.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
118
-
-
26044448602
-
A new deniable authentication protocol from bilinear pairings
-
DOI 10.1016/j.amc.2004.09.030, PII S0096300304006538
-
Lu, R. andZ. Cao, 2005a. A new deniable authentication protocol from bilinear pairings. Applied Math. Comput, 168: 954-961. (Pubitemid 41405653)
-
(2005)
Applied Mathematics and Computation
, vol.168
, Issue.2
, pp. 954-961
-
-
Lu, R.1
Cao, Z.2
-
119
-
-
14844309431
-
Non-interactive deniable authentication protocol based on factoring
-
DOI 10.1016/j.csi.2004.09.007, PII S0920548904001096, Mobile Commerce: A New Frontier in e-Commerce and Wireless Communication
-
Lu, R. and Z. Cao, 2005b. Non-interactive deniable authentication protocol based on factoring. Comput. Standards Interfaces, 27: 401-405. (Pubitemid 40339687)
-
(2005)
Computer Standards and Interfaces
, vol.27
, Issue.4
, pp. 401-405
-
-
Lu, R.1
Cao, Z.2
-
120
-
-
0032684740
-
I/O automaton models and proofs for shared-key communication systems
-
Jun. 28-30, Washington, DC, USA
-
Lynch, N., 1999. I/O automaton models and proofs for shared-key communication systems. Proceedings of the 12th IEEE Computer Security Foundations Workshop, Jun. 28-30, Washington, DC, USA., pp: 14-114.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop
, pp. 14-114
-
-
Lynch, N.1
-
121
-
-
84937438236
-
Threshold password-authenticated key exchange
-
Aug. 18-22, Springer-Verlag London, UK
-
MacKenzie, P., T. Shrimpton and M. Jakobsson, 2002. Threshold password-authenticated key exchange. Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, Aug. 18-22, Springer-Verlag London, UK., pp: 385-400.
-
(2002)
Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
, pp. 385-400
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
122
-
-
78651590497
-
Receipt-freeness in large-scale elections without untappable channels
-
Oct. 03-05, uwer B.V., Deventer, The Netherlands
-
Magkos, E., M. Burmester and V. Chrissikopoulos, 2001. Receipt-freeness in large-scale elections without untappable channels. Proceedings of the IFIP Conference on Towards the E-Society: E-Commerce, E-Business, E-Government, Oct. 03-05, uwer B.V., Deventer, The Netherlands, pp: 683-694.
-
(2001)
Proceedings of the IFIP Conference on Towards the E-Society: E-Commerce, E-Business, E-Government
, pp. 683-694
-
-
Magkos, E.1
Burmester, M.2
Chrissikopoulos, V.3
-
123
-
-
38549169691
-
Simulation-based analysis of E2E voting systems
-
Alkassar, A. and M. Volkamer (Eds.). Springer Verlag, Berlin Heidelberg
-
Marneffe, O., O. Pereira and J.J. Quisquater, 2007. Simulation-Based Analysis of E2E Voting Systems. In: E-Voting and Identity, Alkassar, A. and M. Volkamer (Eds.). Springer Verlag, Berlin Heidelberg, pp: 137-149.
-
(2007)
E-Voting and Identity
, pp. 137-149
-
-
Marneffe, O.1
Pereira, O.2
Quisquater, J.J.3
-
124
-
-
1642340152
-
Is there a future for internet voting?
-
Mason, S., 2004. Is there a future for Internet voting? Comput. Fraud Security, 2004: 6-13.
-
(2004)
Comput. Fraud Security
, vol.2004
, pp. 6-13
-
-
Mason, S.1
-
126
-
-
38049013737
-
An internet voting protocol with receipt-free and coercion-resistant
-
Oct. 16-19, IEEE Computer Society, WashingtonDC, USA
-
Meng, B., 2007 a. An internet voting protocol with receipt-free and coercion-resistant. Proceedings of 7th IEEE International Conference on Computer and Information Technology, Oct. 16-19, IEEE Computer Society, WashingtonDC, USA., pp: 721-726.
-
(2007)
Proceedings of 7th IEEE International Conference on Computer and Information Technology
, pp. 721-726
-
-
Meng, B.1
-
127
-
-
49049110480
-
Analysis of internet voting protocols with jonker-vink receipt freeness formal model
-
Nov. 21-23, ICCIT., IEEE Computer Society, Washington, DC
-
Meng, B., 2007b. Analysis of internet voting protocols with jonker-vink receipt freeness formal model. Proceedings of the 2007 international Conference on Convergence information Technology, Nov. 21-23, ICCIT., IEEE Computer Society, Washington, DC, pp: 663-669.
-
(2007)
Proceedings of the 2007 International Conference on Convergence information Technology
, pp. 663-669
-
-
Meng, B.1
-
128
-
-
57249084061
-
Formal analysis of key properties in the internet voting protocol using applied pi calculus
-
Meng, B., 2008. Formal analysis of key properties in the internet voting protocol using applied pi calculus. Inform. Technol. J., 7: 1133-1140.
-
(2008)
Inform. Technol. J.
, vol.7
, pp. 1133-1140
-
-
Meng, B.1
-
129
-
-
62749124406
-
A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol
-
Meng, B., 2009a. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on internet voting protocol. Inform. Technol. J., 8: 302-309.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 302-309
-
-
Meng, B.1
-
130
-
-
69749119739
-
A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext
-
Meng, B., 2009b. A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext J. Networks, 4: 370-377.
-
(2009)
J. Networks
, vol.4
, pp. 370-377
-
-
Meng, B.1
-
131
-
-
67651029682
-
A formal logic framework for receipt-freeness in internet voting protocol
-
Meng, B., 2009c. A formal logic framework for receipt-freeness in internet voting protocol. J. Comput, 4: 184-192.
-
(2009)
J. Comput
, vol.4
, pp. 184-192
-
-
Meng, B.1
-
132
-
-
0017959977
-
Secure communications over insecure channels
-
Merkle, R.C., 1978. Secure communications over insecure channels. Commun. ACM, 21: 294-299.
-
(1978)
Commun. ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
133
-
-
0004256761
-
-
Ph.D Thesis. Georgia Institute of Technology
-
Merritt, M.J., 1983. Cryptographic protocols. Ph.D Thesis. Georgia Institute of Technology.
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.J.1
-
134
-
-
84955592437
-
Some remarks on a reciept-free and universally verifiable mix-type voting scheme
-
Nov. 03-07, Springer-Verlag London, UK
-
Michels, M. and P. Horster, 1996. Some remarks on a reciept-free and universally verifiable mix-type voting scheme. Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology, Nov. 03-07, Springer-Verlag London, UK., pp: 125-132.
-
(1996)
Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
, pp. 125-132
-
-
Michels, M.1
Horster, P.2
-
135
-
-
0030705405
-
Automated analysis of cryptographic protocols using mur
-
May 04-07, Digital Library
-
Mitchell, J.C., M. Mitchell and U. Stern, 1997. Automated analysis of cryptographic protocols using Mur. Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 04-07, Digital Library, pp: 141-141.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 141-141
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
136
-
-
69549094995
-
Attack for flash MIX
-
Okamoto, T. (Ed.), Springer-Verlag, Berlin Heidelberg
-
Mitomo, M. and K. Kurosawa, 2000. Attack for Flash MIX. In: Advances in Cryptology-ASIACRYPT 2000, Okamoto, T. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 192-204.
-
(2000)
Advances in Cryptology-ASIACRYPT 2000
, pp. 192-204
-
-
Mitomo, M.1
Kurosawa, K.2
-
137
-
-
33749582253
-
Receipt-free universally-verifiable voting with everlasting privacy
-
Dwork, C. (Ed.). Springer-Verlag, Berlin Heidelberg
-
Moran, T. andM. Naor, 2006. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Advances in Cryptology-CRYPTO 2006, Dwork, C. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 373.
-
(2006)
Advances in Cryptology-CRYPTO 2006
, pp. 373
-
-
Moran, T.1
Naor, M.2
-
138
-
-
0035754862
-
A verifiable secret shuffle and its application to e-voting
-
Nov. 05-08, Philadelphia, PA, USA
-
Neff, C.A., 2001. A verifiable secret shuffle and its application to e-voting. Proceedings of the 8th ACM Conference on Computer and Communications Security, Nov. 05-08, Philadelphia, PA, USA., pp: 116-125.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 116-125
-
-
Neff, C.A.1
-
141
-
-
84955613970
-
How to prevent buying of votes in computer elections
-
Nov. 28-Dec. 01, Wollongong, Australia
-
Niemi, V. and A. Renvall, 1995. How to prevent buying of votes in computer elections. Proceedings of the 4th international Conference on the theory and Applications of Cryptology: Advances in Cryptology, Nov. 28-Dec. 01, Wollongong, Australia, pp: 164-170.
-
(1995)
Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
, pp. 164-170
-
-
Niemi, V.1
Renvall, A.2
-
142
-
-
0032272621
-
A comparative overview ofcryptographic voting protocols
-
Nurmi, H. and A. Salomaa, 1998. A comparative overview ofcryptographic voting protocols. Ann. Operat. Res., 84: 29-43.
-
(1998)
Ann. Operat. Res.
, vol.84
, pp. 29-43
-
-
Nurmi, H.1
Salomaa, A.2
-
143
-
-
0002986502
-
Fault tolerant anonymous channel
-
Nov. 11-14, Springer-Verlag London, UK
-
Ogata, W., K. Kurosawa, K. Sako andK. Takatam, 1997. Fault tolerant anonymous channel. Proceedings of the 1 st International Conference on information and Communication Security, Nov. 11-14, Springer-Verlag London, UK., pp: 440-444.
-
(1997)
Proceedings of the 1st International Conference on information and Communication Security
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatam, K.4
-
144
-
-
0042999681
-
An electronic voting scheme
-
1996, IEEE Xplore, London
-
Okamoto , T., 1996. An electronic voting scheme. Proceedings of the IFIP World Conference on IT Tools, 1996, IEEE Xplore, London, pp: 21-30
-
(1996)
Proceedings of the IFIP World Conference on IT Tools
, pp. 21-30
-
-
Okamoto, T.1
-
145
-
-
84956974327
-
Receipt-free electronic voting schemes for large scale elections
-
Christianson, B., B. Crispo, T.M.A. Lomas and M. Roe (Eds.). Springer-Verlag, Berlin Heidelberg
-
Okamoto, T., 1998. Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Security Protocols, Christianson, B., B. Crispo, T.M.A. Lomas and M. Roe (Eds.). Springer-Verlag, Berlin Heidelberg, pp:25-35.
-
(1998)
Security Protocols
, pp. 25-35
-
-
Okamoto, T.1
-
146
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (Ed.). Springer-Verlag, BerlinHeidelberg
-
Paillier, P., 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Advances in Cryptology-EUROCRYPT '99, Stern, J. (Ed.). Springer-Verlag, BerlinHeidelberg, pp: 223-238.
-
(1999)
Advances in Cryptology-EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
147
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Lofthus, Norway
-
Park, C, K. Itoh and K. Kurosawa, 1994. Efficient anonymous channel and all/nothing election scheme. Proceedings of the Workshop on the theory and Application of Cryptographic Techniques on Advances in Cryptology, 1994, Lofthus, Norway, pp: 248-259.
-
(1994)
Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, 1994
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
148
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C., 1998. The inductive approach to verifying cryptographic protocols. J. Comput. Security, 6: 85-128.
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
149
-
-
85030460443
-
A threshold cryptosystem without a trusted party (extended abstract)
-
Davies, D.W. (Ed.). Springer-Verlag, Berlin Heidelberg
-
Pedersen, T.P., 1991. A Threshold Cryptosystem without a Trusted Party (Extended abstract). In: Advances in Cryptology-EUROCRYPT 91, Davies, D.W. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 522-526.
-
(1991)
Advances in Cryptology-EUROCRYPT 91
, pp. 522-526
-
-
Pedersen, T.P.1
-
150
-
-
85032859691
-
How to break the direct RSA-implementation of mixes
-
Houthalen, Belgium
-
Pfitzmann, B. and A. Pfizmann, 1990. How to break the direct RSA-implementation of mixes. Proceedings of the Workshop on the theory and Application of Cryptographic Techniques on Advances in Cryptology, 1990, Houthalen, Belgium, pp: 373-381.
-
(1990)
Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, 1990
, pp. 373-381
-
-
Pfitzmann, B.1
Pfizmann, A.2
-
151
-
-
84948967487
-
Breaking an efficient anonymous channel
-
De Santis A. (Ed.). Springer-Verlag, BerlinHeidelberg
-
Pfitzmann, B., 1995. Breaking an Efficient Anonymous Channel. In: Advances in Cryptology-Eurocrypt '94, De Santis A. (Ed.). Springer-Verlag, BerlinHeidelberg, pp: 332-340.
-
(1995)
Advances in Cryptology-Eurocrypt '94
, pp. 332-340
-
-
Pfitzmann, B.1
-
152
-
-
33745767675
-
New approaches for deniable authentication
-
Nov. 7-11, ACM Press, New York
-
Raimondo, M.D. and R. Gennaro, 2005. New approaches for deniable authentication. Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 7-11, ACM Press, New York, pp: 112-121.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Raimondo, M.D.1
Gennaro, R.2
-
155
-
-
33749663619
-
-
Master Thesis. Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University, Bratislava
-
Rjajjskov'a, Z., 2002. Electronic voting schemes. Master Thesis. Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University, Bratislava.
-
(2002)
Electronic Voting Schemes
-
-
Rjajjskov'a, Z.1
-
156
-
-
35048866464
-
An efficient strong designated verifier signature scheme
-
Lim, J.I. andD.H. Lee (Eds.). LNCS 2971, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-21376-5
-
Saeednia, S., S. Kremer and O. Markowitch, 2004. An Efficient Strong Designated Verifier Signature Scheme. In: Information Security and Cryptology-ICISC 2003, Lim, J.I. andD.H. Lee (Eds.). LNCS 2971, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-21376-5, pp: 40-54.
-
(2004)
Information Security and Cryptology-ICISC 2003
, pp. 40-54
-
-
Saeednia, S.1
Kremer, S.2
Markowitch, O.3
-
157
-
-
84957356080
-
Receipt-free mix-type voting scheme, A practical solution to the implementation of a voting booth
-
Springer-Verlag, Guillou, L.C. and J.J. Quisquater (Eds.), Springer-Verlag, Berlin Heidelberg
-
Sako, K. and J. Kilian, 1995. Receipt-Free Mix-Type Voting Scheme, A Practical Solution to the Implementation of a Voting Booth. In: Advances in Cryptology-EUROCRYPT '95, Springer-Verlag, Guillou, L.C. and J.J. Quisquater (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 393-403.
-
(1995)
Advances in Cryptology-EUROCRYPT '95
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
158
-
-
33644765913
-
A framework and taxonomy for comparison of electronic voting schemes
-
Sampigethaya, K. andR. Poovendran, 2006. A framework and taxonomy for comparison of electronic voting schemes. Comput. Security, 25: 136-153.
-
(2006)
Comput. Security
, vol.25
, pp. 136-153
-
-
Sampigethaya, K.1
Poovendran, R.2
-
159
-
-
0018545449
-
How to share a secret
-
Shamir, A., 1979. How to share a secret. Commun. ACM, 22: 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
160
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Shao, Z., 2004. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Standards Interfaces, 26: 449-454.
-
(2004)
Comput. Standards Interfaces
, vol.26
, pp. 449-454
-
-
Shao, Z.1
-
161
-
-
50249182033
-
Design and prototype of a coercion resistant, voter verifiable electronic voting system
-
October 2004, IEEE Xplore, London
-
Shubina, A.M. and S.W. Smith, 2004. Design and prototype of a coercion resistant, voter verifiable electronic voting system. Procedings of the Conference on Privacy, Security and Trust, October 2004, IEEE Xplore, London, pp: 29-39.
-
(2004)
Procedings of the Conference on Privacy, Security and Trust
, pp. 29-39
-
-
Shubina, A.M.1
Smith, S.W.2
-
162
-
-
69749098005
-
New cryptographic voting scheme with best-known theoretical properties
-
September 2005, Milan, Italy
-
Smith, W.D., 2005a. New cryptographic voting scheme with best-known theoretical properties. Proceedings of the Workshop on Frontiers in Electronic Elections, September 2005, Milan, Italy, pp: 1-14.
-
(2005)
Proceedings of the Workshop on Frontiers in Electronic Elections
, pp. 1-14
-
-
Smith, W.D.1
-
164
-
-
0345058957
-
Universal designated verifier signatures
-
Taipei, Taiwan
-
Steinfeld, R., L. Bull, H. Wang and J. Pieprzyk, 2003. Universal designated verifier signatures. Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, 2003, Taipei, Taiwan, pp: 523-542.
-
(2003)
Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, 2003
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
165
-
-
35048841170
-
Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures
-
Mar. 1-4, Singapore
-
Steinfeld, R., H. Wang and J. Pieprzyk, 2004. Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures. Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, Mar. 1-4, Singapore, pp: 86-100.
-
(2004)
Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
167
-
-
35048836270
-
Identity-based strong designated verifier signature schemes
-
Wang, H. at al. (Eds.). Springer-Verlag, Berlin Heidelberg
-
Susilo, W., F. Zhang and Y. Mu, 2004. Identity-Based Strong Designated Verifier Signature Schemes. In: Information Security and Privacy, Wang, H. at al. (Eds.). Springer-Verlag, Berlin Heidelberg, pp: 313-324.
-
(2004)
Information Security and Privacy
, pp. 313-324
-
-
Susilo, W.1
Zhang, F.2
Mu, Y.3
-
168
-
-
57049135194
-
Specification of electronic voting protocol properties using ADM logic: FOO case study
-
Oct. 20-22, Birmingham, UK
-
Talbi, M., B. Morin, V. Viet Triem Tong, A. Bouhoula and M. Mejri, 2008. Specification of electronic voting protocol properties using ADM logic: FOO case study. Proceedings of the 10th international Conference on information and Communications Security, Oct. 20-22, Birmingham, UK., pp: 403-418.
-
(2008)
Proceedings of the 10th International Conference on Information and Communications Security
, pp. 403-418
-
-
Talbi, M.1
Morin, B.2
Viet Triem Tong, V.3
Bouhoula, A.4
Mejri, M.5
-
169
-
-
69749091231
-
Dynamic mobile anonymity with mixing
-
Mar. 1-4, Singapore
-
Tatli, E.I., D. Stegemann and S. Lucks, 2006. Dynamic mobile anonymity with mixing. Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, Mar. 1-4, Singapore, pp:86-100.
-
(2006)
Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography
, pp. 86-100
-
-
Tatli, E.I.1
Stegemann, D.2
Lucks, S.3
-
170
-
-
0031676397
-
Strand space: Why is a security protocol correct?
-
ACM, USA
-
Thayer, F., J.C. Herzog and J.D. Guttman, 1998. Strand space: Why is a security protocol correct? Proceedings of the 1998 IEEE Symposium on Security and Privacy, 1998, ACM, USA., pp: 160-171.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy, 1998
, pp. 160-171
-
-
Thayer, F.1
Herzog, J.C.2
Guttman, J.D.3
-
175
-
-
34548150987
-
On coercion-resistant electronic elections with linear work
-
Apr. 10-13, IEEE Computer Society, Washington, DC
-
Weber, S.G., R. Araujo and J. Buchmann, 2007. On coercion-resistant electronic elections with linear work. Proceedings of the 2nd International Conference on Availability, Reliability and Security, Apr. 10-13, IEEE Computer Society, Washington, DC, pp: 908-916.
-
(2007)
Proceedings of the 2nd International Conference on Availability, Reliability and Security
, pp. 908-916
-
-
Weber, S.G.1
Araujo, R.2
Buchmann, J.3
-
176
-
-
57849139755
-
A receipt-free punch-hole ballot electronic voting scheme
-
Dec. 16-18, IEEE Computer Society, Washington, DC
-
Wei, H., Z. Dong and C. Ke-fei, 2007. A receipt-free punch-hole ballot electronic voting scheme. Proceedings of the 3rd International IEEE Conference on Signal-Image Technologies and internet-Based System Dec. 16-18, IEEE Computer Society, Washington, DC, pp: 355-360.
-
(2007)
Proceedings of the 3rd International IEEE Conference on Signal-image
, pp. 355-360
-
-
Wei, H.1
Dong, Z.2
Ke-Fei, C.3
-
177
-
-
33746365152
-
An adaptively secure mix-vet without erasures
-
Bugliesi, M. et al. (Eds.). Springer Verlag, Berlin Heidelberg
-
Wikström, D. and J. Groth, 2006. An Adaptively Secure Mix-Net without Erasures. In: Automata, Languages and Programming, Bugliesi, M. et al. (Eds.). Springer Verlag, Berlin Heidelberg, pp: 276-287.
-
(2006)
Automata, Languages and Programming
, pp. 276-287
-
-
Wikström, D.1
Groth, J.2
-
178
-
-
35048873776
-
A universally composable mix-net
-
Maor, M. (Ed.). Springer Verlag, Berlin Heidelberg
-
Wikström, D., 2004a. A Universally Composable Mix-Net. In: Theory of Cryptography, Maor, M. (Ed.). Springer Verlag, Berlin Heidelberg, pp: 317-335.
-
(2004)
Theory of Cryptography
, pp. 317-335
-
-
Wikström, D.1
-
179
-
-
35048848969
-
Five practical attacks for optimistic mixing for exit-polls
-
Aug. 14-15, Ottawa, Canada
-
Wikström, D., 2004b. Five practical attacks for optimistic mixing for exit-polls. Proceedings of the 10th Annual International Workshop, Aug. 14-15, Ottawa, Canada, pp: 160-175.
-
(2004)
Proceedings of the 10th Annual International Workshop
, pp. 160-175
-
-
Wikström, D.1
-
180
-
-
33646794034
-
A sender verifiable mix-net and a new proof of a shuffle
-
Roy, B. (Ed.). Springer Verlag, Berlin Heidelberg
-
Wikström, D., 2005. A Sender Verifiable Mix-Net and a New Proof of a Shuffle. In: Advances in Cryptology-ASIACRYPT 2005, Roy, B. (Ed.). Springer Verlag, Berlin Heidelberg, pp: 273.
-
(2005)
Advances in Cryptology-ASIACRYPT 2005
, vol.273
-
-
Wikström, D.1
-
181
-
-
65249187757
-
A new efficient on-line/offline threshold signature scheme
-
Wu, C.H. andX.F. Chen, 2009. A new efficient on-line/offline threshold signature scheme. Chinese J. Elect., 18: 321-324.
-
(2009)
Chinese J. Elect.
, vol.18
, pp. 321-324
-
-
Wu, C.H.1
Chen, X.F.2
-
182
-
-
0001772530
-
Protocols for secure computations
-
Nov. 03-05, IEEE Computer Society, Washington, DC
-
Yao, A.C., 1982a. Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Nov. 03-05, IEEE Computer Society, Washington, DC, pp:1600-2164.
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
, pp. 1600-2164
-
-
Yao, A.C.1
-
183
-
-
0020301290
-
Theory and application of trapdoor functions
-
Nov. 03-05, IEEE Computer Society, Washington, DC
-
Yao, A.C., 1982b. Theory and application of trapdoor functions. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Nov. 03-05, IEEE Computer Society, Washington, DC, pp: 80-91.
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
-
185
-
-
26444589650
-
Short signature and universal designated verifier signature without random oracles
-
Jun. 7-10, New York, USA
-
Zhang, R., J. Furukawa andH. Imai, 2005. Short signature and universal designated verifier signature without random oracles. Proceedings of the 3rd International Conference Applied Cryptography and Network Security, Jun. 7-10, New York, USA., 483-498
-
(2005)
Proceedings of the 3rd International Conference Applied Cryptography and Network Security
, pp. 483-498
-
-
Zhang, R.1
Furukawa, J.2
Imai, H.3
-
186
-
-
33745211009
-
Cryptanalysis of a suite of deniable authentication protocols
-
Zhu, R.W., D.S. Wong and C.H. Lee, 2006. Cryptanalysis of a suite of deniable authentication protocols. IEEE Commun. Lett., 10: 504-506.
-
(2006)
IEEE Commun. Lett.
, vol.10
, pp. 504-506
-
-
Zhu, R.W.1
Wong, D.S.2
Lee, C.H.3
-
187
-
-
33846586500
-
A light-weight e-voting system with distributed trust
-
Zwierko, A. and Z. Kotulski, 2007. A light-weight e-voting system with distributed trust. Elect. Notes Theor. Comput. Sci., 168:
-
(2007)
Elect. Notes Theor. Comput. Sci.
, vol.168
, pp. 109-126
-
-
Zwierko, A.1
Kotulski, Z.2
|