-
1
-
-
84885208090
-
Scratch & Vote: Self-contained paper-based cryptographic voting
-
B. Adida and R. L. Rivest. Scratch & vote: self-contained paper-based cryptographic voting. In WPES '06, pages 29-40, 2006.
-
(2006)
WPES '06
, pp. 29-40
-
-
Adida, B.1
Rivest, R.L.2
-
2
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Y. Aumann, Y. Z. Ding, and M. O. Rabin. Everlasting security in the bounded storage model. IEEE Trans. on Information Theory, 48 (6):1668-1680, 2002.
-
(2002)
IEEE Trans. on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
3
-
-
0028087488
-
Receipt-free secret-ballot elections
-
J. Benaloh and D. Tuinstra. Receipt-free secret-ballot elections. In STOC '94, pages 544-553, 1994.
-
(1994)
STOC '94
, pp. 544-553
-
-
Benaloh, J.1
Tuinstra, D.2
-
4
-
-
24744445833
-
A simplified version of the chaum voting scheme
-
University of Newcastle
-
J. W. Bryans and P. Y. A. Ryan. A simplified version of the Chaum voting scheme. Technical Report CS-TR 843, University of Newcastle, 2004.
-
(2004)
Technical Report CS-TR 843
-
-
Bryans, J.W.1
Ryan, P.Y.A.2
-
5
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067, 2000.
-
(2000)
Cryptology EPrint Archive, Report 2000/067
-
-
Canetti, R.1
-
6
-
-
0030416397
-
Incoercible multiparty computation
-
R. Canetti and R. Gennaro. Incoercible multiparty computation. In FOCS '96, pages 504-513.
-
FOCS '96
, pp. 504-513
-
-
Canetti, R.1
Gennaro, R.2
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24 (2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
2342617507
-
E-voting: Secret-ballot receipts: True voter-verifiable elections
-
Jan./Feb
-
D. Chaum. E-voting: Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy, 2 (1):38-47, Jan./Feb. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 38-47
-
-
Chaum, D.1
-
9
-
-
77952374452
-
-
D. Chaum, 2006. http://punchscan.org/.
-
(2006)
-
-
Chaum, D.1
-
10
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme
-
Benaloh, and, In
-
J. D. Cohen (Benaloh) and M. J. Fischer. A robust and verifiable cryptographically secure election scheme. In FOCS '85, pages 372-382.
-
FOCS '85
, pp. 372-382
-
-
Cohen, J.D.1
Fischer, M.J.2
-
12
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Eurocrypt '97, pages 103-118.
-
Eurocrypt '97
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
13
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In AUSCRYPT '92, pages 244-251.
-
AUSCRYPT '92
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
14
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In Eurocrypt '00, pages 539+.
-
Eurocrypt '00
-
-
Hirt, M.1
Sako, K.2
-
15
-
-
26444553313
-
Basing cryptographic protocols on tamper-evident seals
-
T. Moran and M. Naor. Basing cryptographic protocols on tamper-evident seals. In ICALP '05, pages 285-297.
-
ICALP '05
, pp. 285-297
-
-
Moran, T.1
Naor, M.2
-
16
-
-
33749582253
-
Receipt-free universally-verifiable voting with everlasting privacy
-
T. Moran and M. Naor. Receipt-free universally-verifiable voting with everlasting privacy. In CRYPTO, pages 373-392, 2006. http://www.wisdom.weizmann. ac.il/~talm/papers/MN06-votingpdf.
-
(2006)
CRYPTO
, pp. 373-392
-
-
Moran, T.1
Naor, M.2
-
17
-
-
84926193517
-
Visual cryptography
-
of LNCS
-
M. Naor and A. Shamir. Visual cryptography. In Eurocrypt '94, volume 950 of LNCS, pages 1-12, 1995.
-
(1995)
Eurocrypt '94
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
20
-
-
0020829007
-
Transaction protection by beacons
-
M. O. Rabin. Transaction protection by beacons. J. Computer and System Sciences, 27 (2):256-267, 1983.
-
(1983)
J. Computer and System Sciences
, vol.27
, Issue.2
, pp. 256-267
-
-
Rabin, M.O.1
-
21
-
-
77952358064
-
A method for electronic voting with coercion-free receipt
-
D. J. Reynolds. A method for electronic voting with coercion-free receipt. Presentation: http://www.win. tue.nl/~berry/fee2005/presentations/ reynolds.ppt.
-
Presentation
-
-
Reynolds, D.J.1
-
22
-
-
33749569117
-
A variant of the chaum voter-verifiable scheme
-
P. Y. A. Ryan. A variant of the Chaum voter-verifiable scheme. In WITS '05, pages 81-88, 2005.
-
(2005)
WITS '05
, pp. 81-88
-
-
Ryan, P.Y.A.1
|