Blinded additively homomorphic encryption schemes for self-tallying voting
Tài liệu tham khảo
Adida, 2008, Helios: web-based open-audit voting, 335
Adida, 2009, Electing a University President using Open-Audit Voting (SlideShow), 10
Adida, 2010, State of Helios 2010 : features and deployments
Anderson, 1996, Tamper resistance: a cautionary note, vol. 2, 1
Backes, 2008, Zero-knowledge in the applied Pi-calculus and automated verification of the direct anonymous attestation protocol, 202
Brandi, 2006, On bidder zones, cell phones and ballot stuffing, 1
Brandi, 2008, Preservation of privacy in thwarting the ballot stuffing scheme, vol. 5185, 195
Burnand, 2010
Castagnos, 2007, Towards a DL-based additively homomorphic encryption scheme, vol. 4779, 362
Chaum, 1988, The dining cryptographers problem: unconditional sender and recipient untraceability, J. Cryptol, 1, 65, 10.1007/BF00206326
Clark, 2011
Clarkson, 2008, Civitas : toward a secure voting system, 7875, 354
Cortier, 2011, Attacking and fixing Helios: an analysis of ballot secrecy, 297
Cortier, 2011, Ballot stuffing in a postal voting system, 27
Cortier, 2010
Dossogne, 2011, Mental voting booths, 82
Dossogne, 2012, Coercion-Freeness in e-voting via Multi-party Designated Verifier Schemes, 127
Dossogne, 2009, Voting with a tripartite designated verifier scheme based on threshold RSA signatures, vol. 1, 113
Dossogne, 2010, Online banking and man in the browser attacks, survey of the belgian situation, 19
Dossogne, 2011, Enhancing cryptographic code against side channel cryptanalysis with aspects, 39
El Gamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, 469
Gonzalez, 2012
Groth, 2004, Efficient maximal privacy in Boardroom voting and anonymous broadcast, vol. 3110, 90
Heiberg, 2010, On E-vote Integrity in the case of malicious voter computers, vol. 6345, 373
Juels, 2005, Coercion-resistant electronic elections, 61
Kiayias, 2002, Self-tallying elections and perfect ballot secrecy, vol. 2274, 141
Kramer, 2011, A modular multi-modal specification of real-timed, End-To-End voter-verifiable voting systems
Laguillaumie, 2007, Multi-designated verifiers signatures: anonymity without encryption, Information Processing Letters, 102, 127, 10.1016/j.ipl.2006.08.015
Lenstra, 1990, Algorithms in number theory, vol. A, 673
Li, 2012, Boardroom voting scheme with unconditionally secret ballots based on DC-Net, vol. 7645, 220
Neumann, 2013, Towards a practical JCJ/civitas implementation, vol. 220, 804
Neumann, 2012, Civitas and the real world: problems and solutions from a practical point of view, 180
Olembo, 2012, Partial verifiability in POLYAS for the GI Elections, vol. 205, 95
Olio, 2004, Voting with designated verifier signature-like protocol, 295
Paillier, 1999, Public-key cryptosystems based on composite degree residuosity classes, vol. 1592, 223
Rfi.fr, 2012
Ryan, 2006
Sampigethaya, 2006, A framework and taxonomy for comparison of electronic voting schemes, Computers & Security, 25, 137, 10.1016/j.cose.2005.11.003
Sensei Enterprises, I, 2004
Shirazi, 2011, Robust electronic voting: introducing robustness in Civitas, 47
Shoup, 1997, Lower Bounds for discrete logarithms and related problems, vol. 1233, 256
Vabariigi Valimiskomisjon, 2011
Weber, 2011
Yi, 2011, Practical remote end-to-end voting scheme, vol. 6866, 386