메뉴 건너뛰기




Volumn , Issue , 2009, Pages 450-454

A verifiable electronic voting scheme over the internet

Author keywords

Blind signature; Cryptosystem; Electronic voting; Security; Verifiability

Indexed keywords

CRYPTOGRAPHY; VOTING MACHINES;

EID: 77951127152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2009.93     Document Type: Conference Paper
Times cited : (33)

References (22)
  • 1
    • 0034543450 scopus 로고    scopus 로고
    • The Italian academic community's electronic voting system
    • December
    • P. Bonetti, S. Ravaioli, and S. Piergallini. The Italian academic community's electronic voting system. Computer Networks, 34(6):851-860, December 2000.
    • (2000) Computer Networks , vol.34 , Issue.6 , pp. 851-860
    • Bonetti, P.1    Ravaioli, S.2    Piergallini, S.3
  • 2
    • 33744970314 scopus 로고    scopus 로고
    • An anonymous voting mechanism based on the key exchange protocol
    • DOI 10.1016/j.cose.2006.02.004, PII S0167404806000320
    • C. C. Chang and J. S. Lee. An anonymous voting mechanism based on the key exchange protocol. Computers & Security, 25(4):307-314, 2006. (Pubitemid 43866955)
    • (2006) Computers and Security , vol.25 , Issue.4 , pp. 307-314
    • Chang, C.-C.1    Lee, J.-S.2
  • 3
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, CRYPTO'82, pages 199-203, 1982.
    • (1982) Advances in Cryptology, CRYPTO'82 , pp. 199-203
    • Chaum, D.1
  • 5
    • 77951106449 scopus 로고    scopus 로고
    • Multi-authority secret bollat elections with linear work
    • Advances in Cryptology, EUROCRYPT'96, pages 72-83
    • R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung. Multi-authority secret bollat elections with linear work. In Advances in Cryptology, EUROCRYPT'96, pages 72-83, Lecture Notes in Computer Science, 1070, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1070
    • Cramer, R.1    Franklin, M.2    Schoenmakers, B.3    Yung, M.4
  • 6
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • Advances in Cryptology, EUROCRYPT'97, pages 103-117
    • R. Cramer, R. Gennaro, and J. Borrell. A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology, EUROCRYPT'97, pages 103-117, Lecture Notes in Computer Science, 1233, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233
    • Cramer, R.1    Gennaro, R.2    Borrell, J.3
  • 7
    • 77951122582 scopus 로고    scopus 로고
    • Formal specification and verification of a secure micropayment protocol
    • M. G. Gouda and A. X. Liu. Formal specification and verification of a secure micropayment protocol. International Journal of Network Security, 7(1):81-87, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 81-87
    • Gouda, M.G.1    Liu, A.X.2
  • 9
    • 0036466678 scopus 로고    scopus 로고
    • Adding timestamps to the secure electronic auction protocol
    • DOI 10.1016/S0169-023X(01)00048-9, PII S0169023X01000489
    • M.-S. Hwang, E. J.-L. Lu, and I.-C. Lin. Adding timestamps to the secure electronic auction protocol. Data & Knowledge Engineering, 40(2):155-162, 2002. (Pubitemid 33107287)
    • (2002) Data and Knowledge Engineering , vol.40 , Issue.2 , pp. 155-162
    • Hwang, M.-S.1    Lu, E.J.-L.2    Lin, I.-C.3
  • 12
    • 0031281744 scopus 로고    scopus 로고
    • A secure electronic voting protocol with IC cards
    • November
    • J.-K. Jan and C.-C. Tai. A secure electronic voting protocol with IC cards. Journal of Systems and Software, 39(2):93-101, November 1997.
    • (1997) Journal of Systems and Software , vol.39 , Issue.2 , pp. 93-101
    • Jan, J.-K.1    Tai, C.-C.2
  • 13
    • 73149093942 scopus 로고    scopus 로고
    • Efficient user authentication and key agreement with user privacy protection
    • W.-S. Juang and J.-L. Wu. Efficient user authentication and key agreement with user privacy protection. International Journal of Network Security, 7(1):120-129, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 120-129
    • Juang, W.-S.1    Wu, J.-L.2
  • 14
    • 77951135883 scopus 로고    scopus 로고
    • Vulnerabilities in the Adachi-Aoki- Komano-Ohta micropayment scheme
    • M. Kim and C. K. Koc. Vulnerabilities in the Adachi-Aoki- Komano-Ohta micropayment scheme. International Journal of Network Security, 4(2):235-239, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.2 , pp. 235-239
    • Kim, M.1    Koc, C.K.2
  • 15
    • 0033077761 scopus 로고    scopus 로고
    • A secure and practical electronic voting scheme
    • W.-C. Ku and S.-D.Wang. A secure and practical electronic voting scheme. Computer Communicarions, 22(3):279-286, 1999.
    • (1999) Computer Communicarions , vol.22 , Issue.3 , pp. 279-286
    • Ku, W.-C.1    Wang, S.-D.2
  • 16
    • 0032182084 scopus 로고    scopus 로고
    • A universal single-authority election system
    • C. L. Lei and C. I. Fan. A universal single-authority election system. IEICE Transactions on Fundamentals, E81-A(10):2186-2193, 1998.
    • (1998) IEICE Transactions on Fundamentals , vol.10 E81-A , pp. 2186-2193
    • Lei, C.L.1    Fan, C.I.2
  • 17
    • 1542275320 scopus 로고    scopus 로고
    • A secure electronic voting protocol for general elections
    • H. T. Liaw. A secure electronic voting protocol for general elections. Computers & Security, 23(2):107-119, 2004.
    • (2004) Computers & Security , vol.23 , Issue.2 , pp. 107-119
    • Liaw, H.T.1
  • 20
    • 0034299716 scopus 로고    scopus 로고
    • Efficient construction of vote-tags to allow open objection to the tally in electronic elections
    • October
    • A. Riera, J. Rifà, and J. Borrell. Efficient construction of vote-tags to allow open objection to the tally in electronic elections. Information Processing Letters, 75(5):211-215, October 2000.
    • (2000) Information Processing Letters , vol.75 , Issue.5 , pp. 211-215
    • Riera, A.1    Rifà, J.2    Borrell, J.3
  • 21
    • 77951106968 scopus 로고    scopus 로고
    • Privacy-preserving data mining in electronic surveys
    • J. Zhan and S. Matwin. Privacy-preserving data mining in electronic surveys. International Journal of Network Security, 4(3):318-327, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.3 , pp. 318-327
    • Zhan, J.1    Matwin, S.2
  • 22
    • 77951095504 scopus 로고    scopus 로고
    • Anonymizing geographic ad hoc routing for preserving location privacy
    • Z. Zhou and K. C. Yow. Anonymizing geographic ad hoc routing for preserving location privacy. International Journal of Network Security, 2(3):210-218, 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.3 , pp. 210-218
    • Zhou, Z.1    Yow, K.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.