메뉴 건너뛰기




Volumn , Issue , 2010, Pages 526-535

Accountability: Definition and relationship to verifiability

Author keywords

Security; Verification

Indexed keywords

ANALYSIS OF PROTOCOLS; COMPUTATIONAL MODEL; IDENTITY BASED ENCRYPTION; NON-REPUDIATION; PROOF OF CONCEPT; SECURE MULTI-PARTY COMPUTATION; SECURITY; TRUSTED PARTY; VERIFIABILITY; WEAK FORM;

EID: 78649990816     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866366     Document Type: Conference Paper
Times cited : (156)

References (25)
  • 1
    • 24344493908 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • M. Abadi and B. Blanchet. Computer-assisted Verification of a Protocol for Certified Email. Sci. Comput. Program., 58(1-2):3-27, 2005.
    • (2005) Sci. Comput. Program. , vol.58 , Issue.1-2 , pp. 3-27
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • ACM
    • M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In POPL 2001, p. 104-115, ACM.
    • POPL 2001 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 3
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • IEEE Computer Society
    • N. Asokan, V. Shoup, and M. Waidner. Asynchronous Protocols for Optimistic Fair Exchange. In S&P 1998, p. 86-99, IEEE Computer Society.
    • S&P 1998 , pp. 86-99
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 4
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • TCC 2007, Springer
    • Y. Aumann and Y. Lindell. Security against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In TCC 2007, vol. 4392 of LNCS, p. 137-156. Springer.
    • LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 5
    • 33748318017 scopus 로고    scopus 로고
    • Accountability protocols: Formalized and verified
    • G. Bella and L. Paulson. Accountability Protocols: Formalized and Verified. ACM Trans. Inf. Syst. Secur., 9(2):138-161, 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.2 , pp. 138-161
    • Bella, G.1    Paulson, L.2
  • 6
    • 38549086047 scopus 로고    scopus 로고
    • Bingo voting: Secure and coercion-free voting using a trusted random number generator
    • VOTE-ID 2007. Springer
    • J.-M. Bohli, J. Müller-Quade, and S. Röhrich. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. In VOTE-ID 2007, vol. 4896 of LNCS, p. 111-124. Springer.
    • LNCS , vol.4896 , pp. 111-124
    • Bohli, J.-M.1    Müller-Quade, J.2    Röhrich, S.3
  • 7
    • 80052018605 scopus 로고    scopus 로고
    • Scantegrity II: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes
    • USENIX Association
    • D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, R. L. Rivest, P. Ryan, E. Shen, and A. Sherman. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. In EVT 2008, USENIX Association.
    • EVT 2008
    • Chaum, D.1    Carback, R.2    Clark, J.3    Essex, A.4    Popoveniuc, S.5    Rivest, R.L.6    Ryan, P.7    Shen, E.8    Sherman, A.9
  • 8
    • 33646028830 scopus 로고    scopus 로고
    • A practical, voter-verifiable election scheme
    • ESORICS 2005, Springer
    • D. Chaum, P. Ryan, and S. Schneider. A Practical, Voter-verifiable Election Scheme. In ESORICS 2005, vol. 3679 of LNCS, p. 118-139, Springer.
    • LNCS , vol.3679 , pp. 118-139
    • Chaum, D.1    Ryan, P.2    Schneider, S.3
  • 10
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • CRYPTO 1999, Springer
    • J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free Optimistic Contract Signing. In CRYPTO 1999, vol. 1666 of LNCS, p. 449-466, Springer.
    • LNCS , vol.1666 , pp. 449-466
    • Garay, J.A.1    Jakobsson, M.2    MacKenzie, P.3
  • 11
    • 70349289356 scopus 로고    scopus 로고
    • Black-box accountable authority identity-based encryption
    • ACM
    • Vipul Goyal, Steve Lu, Amit Sahai, and Brent Waters. Black-box Accountable Authority Identity-based Encryption. In CCS 2008, p. 427-436, ACM.
    • CCS 2008 , pp. 427-436
    • Goyal, V.1    Lu, S.2    Sahai, A.3    Waters, B.4
  • 12
    • 70350353223 scopus 로고    scopus 로고
    • Reliable evidence: Auditability by typing
    • Springer
    • N. Guts, C. Fournet, and F. Nardelli. Reliable Evidence: Auditability by Typing. In ESORICS 2009, p. 168-183, Springer.
    • ESORICS 2009 , pp. 168-183
    • Guts, N.1    Fournet, C.2    Nardelli, F.3
  • 14
    • 39749130001 scopus 로고    scopus 로고
    • Transforming semi-honest protocols to ensure accountability
    • W. Jiang, C. Clifton, and M. Kantarcioglu. Transforming Semi-honest Protocols to Ensure Accountability. Data Knowl. Eng., 65(1):57-74, 2008.
    • (2008) Data Knowl. Eng. , vol.65 , Issue.1 , pp. 57-74
    • Jiang, W.1    Clifton, C.2    Kantarcioglu, M.3
  • 15
    • 33749009810 scopus 로고    scopus 로고
    • Coercion-resistant electronic elections
    • ACM Press
    • A. Juels, D. Catalano, and M. Jakobsson. Coercion-resistant Electronic Elections. In WPES 2005, p. 61-70, ACM Press.
    • WPES 2005 , pp. 61-70
    • Juels, A.1    Catalano, D.2    Jakobsson, M.3
  • 16
    • 33746368726 scopus 로고    scopus 로고
    • A dolev-yao-based definition of abuse-free protocols
    • ICALP 2006, Springer
    • D. Kähler, R. Küsters, and Th. Wilke. A Dolev-Yao-based Definition of Abuse-free Protocols. In ICALP 2006, vol. 4052 of LNCS, p. 95-106, Springer.
    • LNCS , vol.4052 , pp. 95-106
    • Kähler, D.1    Küsters, R.2    Wilke, Th.3
  • 18
    • 77952345661 scopus 로고    scopus 로고
    • Split-ballot voting: Everlasting privacy with distributed trust
    • ACM
    • T. Moran and M. Naor. Split-ballot Voting: Everlasting Privacy with Distributed Trust. In CCS 2007, p. 246-255. ACM.
    • CCS 2007 , pp. 246-255
    • Moran, T.1    Naor, M.2
  • 19
    • 70450210406 scopus 로고    scopus 로고
    • Practical secrecy-preserving, verifiably correct and trustworthy auctions
    • D. Parkes, M. Rabin, S. Shieber, and C. Thorpe. Practical Secrecy-preserving, Verifiably Correct and Trustworthy Auctions. In ICEC 2006, p. 70-81.
    • ICEC 2006 , pp. 70-81
    • Parkes, D.1    Rabin, M.2    Shieber, S.3    Thorpe, C.4
  • 20
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • CRYPTO 1991, Springer
    • T. Pedersen. Non-interactive and Information-theoretic Secure Verifiable Secret Sharing. In CRYPTO 1991, vol. 576 of LNCS, p. 129-140, Springer.
    • LNCS , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 21
    • 84957356080 scopus 로고    scopus 로고
    • Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth
    • EUROCRYPT 1999, Springer
    • K. Sako and J. Kilian. Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. In EUROCRYPT 1999, vol. 921 of LNCS, p. 393-403, Springer.
    • LNCS , vol.921 , pp. 393-403
    • Sako, K.1    Kilian, J.2
  • 23
    • 57049135194 scopus 로고    scopus 로고
    • Specification of electronic voting protocol properties using ADM logic: Foo case study
    • ICICS 2008, Springer
    • M. Talbi, B. Morin, V. Tong, A. Bouhoula, and M. Mejri. Specification of Electronic Voting Protocol Properties using ADM Logic: Foo Case Study. In ICICS 2008, vol. 5308 of LNCS, p. 403-418, Springer.
    • LNCS , vol.5308 , pp. 403-418
    • Talbi, M.1    Morin, B.2    Tong, V.3    Bouhoula, A.4    Mejri, M.5
  • 24
    • 62949151388 scopus 로고    scopus 로고
    • Accountability of perfect concurrent signature
    • Li Yunfeng, He Dake, and Lu Xianhui. Accountability of Perfect Concurrent Signature. ICCEE 2008, p. 773-777.
    • ICCEE 2008 , pp. 773-777
    • Yunfeng, L.1    Dake, H.2    Xianhui, L.3
  • 25
    • 0029724319 scopus 로고    scopus 로고
    • A fair non-repudiation protocol
    • IEEE Computer Society Press
    • J. Zhou and D. Gollmann. A Fair Non-repudiation Protocol. In S&P 1996, p. 55-61, IEEE Computer Society Press.
    • S&P 1996 , pp. 55-61
    • Zhou, J.1    Gollmann, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.