|
[1] B. Schneier. Applied Cryptography : Protocols, Algorithms, and Source Code in C. Wiley, 2nd Edition, 1995.
[2] D. L. Chaum. "Untraceable electronic mail, return addresses ,and digital pseudonyms". Communication of the ACM , Vol.24, No.2, pp.84-88(Feb.,1981).
[3] D. Chaum, "Elections with Unconditionally-secret Ballots and Disruption Equivalent to breaking RSA", in Advances in Cryptology - EUROCRYPT '88, Leture Notes in Computer Science 330, Springer-Verlag, Berlin, pp.177-182(1988).
[4] Kenneth R. Iversen, "A Cryptographic Scheme for Computerized General Elections", in Advances in Cryptology - CRYPTO '91, Le0ture Notes in Computer Science 576, Springer-Verlag, Berlin, pp.405-419(1992)
[5] Josh D. Cohen and Michael J. Fischer. A robust and verifiable cryptographically secure election scheme (extended abstract). Technical Report YALEU/DCS/TR-454, Yale University, July 1985.
[6] Josh Benaloh and Dwight Tuinstra. Receipt-free secret-ballot elections, In Proccedings of the Twenty-sixth Annual ACM Symposium on the Theory of Computing, pages 544--553, May 23-25, 1994
[7] Richard Demillo and Michael Merritt. Protocols for data security. Computer, pages 39-51, February 1983.
[8] Hannu Nurmi, Arto Salomaa, and Lila Santean, Secret ballot elections in computer networks. Computer & Security, 36(10):553-560, 1991
[9] Salomaa, A. Verifying and recasting secret ballots in computer networks. In New Results and New Trends in Computer Science Springer-Verlag, Berlin. 1991, pp. 283-289
[10] D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology - Crypto '82, pages 199-203, Springer-Verlag, 1983.
[11] Fujioka , A ,Okamoto, T., and Ohta, K. A practical secret voting scheme for large scale elections. In Advances in Cryptology - AUSCRYPT '92, Springer-Verlag, Berlin. 1993, pp. 244-251.
|