[1] M. Andrychowicz, et al. "Secure multiparty computations on Bitcoin." Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 2014.
[2] L. Chen. "Oblivious signatures." Computer Security—ESORICS 1994. Springer, LNCS, Vol.875, 1994, pp. 161-172.
[3] C. Chu. “Efficient k-out-of-n Oblivious Transfer Schemes.” J. UCS, 2008, pp. 397-415.
[4] N. Johnson, BM. Jones, and K. Clendenon. "e-Voting in America: Current Realities and Future Directions." International Conference on Social Computing and Social Media. Springer, Cham, 2017.
[5] TS. Liao, MT. Wang and HP. Tserng. “A framework of electronic tendering for government procurement: a lesson learned in Taiwan.” Automation in construction 11.6 (2002): 731-742.
[6] S. Nakamoto. "Bitcoin: A peer-to-peer electronic cash system." (2008): 28.
[7] DG. Nair, VP. Binu and GS Kumar. “An improved e-voting scheme using secret sharing based secure multi-party computation.” arXiv preprint arXiv:1502.07469, 2015.
[8] P. Paillier. “Public-key cryptosystems based on composite degree residuosity classes residues.” Advances in Cryptology - Eurocrypt’99, LNCS 1592, Springer-Verlag, pp.223-238, 1999.
[9] M. Rabin. “How to exchange secrets by oblivious transfer,” Technical Report, Aiken Computation Laboratory, Harvard University, 1981.
[10] A. Shamir. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613.
[11] C. Tang. “Verifiable oblivious transfer protocol.” Journal of Guangzhou University (Natural Science Edition), 2010.
[12] R. Tso, T. Okamoto and E. Okamoto. “1-out-of-n Oblivious Signatures”, Lecture Notes in Computer Science 4991 (2008): 45-55.
[13] K. Wang and Y. Dai. “Secure Multiparty Computation of Statistical Distribution.” Journal of Computer Research and Development, 2010, 2: 002.
[14] YI. Xun, et al. “Privacy protection for wireless medical sensor data.” IEEE transactions on dependable and secure computing, 2016, 13.3: 369-380.
[15] Kosba, Ahmed, et al. "Hawk: The blockchain model of cryptography and privacy-preserving smart contracts." Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016.
[16] https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing
[17] http://www.lawbank.com.tw/treatise/lawrela.aspx?lsid=FL000659&ldate=19980527&lno=6,26,27,28,29,33,34,37,60,87,103
[18] https://l.facebook.com/l.php?u=http%3A%2F%2Flawweb.pcc.gov.tw%2FEngLawContent.aspx%3FType%3DE%26id%3D49&h=ATO-ngxL2wDc3Q7mxpsmRhuiXYTSkSQ4TefDiI_LY09nrOLIng01vbeDLXFya85jhREWyvLQFlgfERpvRJmRPRgaTR36MAWpVfe9_ZKtkXT5vNoYZDhOwfxn5LTrLeIlYrTX15areVUO
[19] http://www.general.ncnu.edu.tw/ias/%E8%AC%9B%E7%BF%92%E8%B3%87%E6%96%99%E4%B8%8B%E8%BC%89/100%E5%B9%B4%E6%8E%A1%E8%B3%BC%E7%B5%84%E6%95%99%E8%82%B2%E8%A8%93%E7%B7%B4/1001117%E6%94%BF%E5%BA%9C%E6%8E%A1%E8%B3%BC%E6%B3%95%E6%A6%82%E8%A6%81%E5%8F%8A%E4%BD%9C%E6%A5%AD%E6%B5%81%E7%A8%8B.pdf
[20] http://gca.nat.gov.tw/web2/about02.html
[21] 王建智,“可驗證性模糊傳送之研究.” 南台科大碩士班學位論文2005.[22] 李榮三, “模糊傳輸協定.” 逢甲大學資訊工程學系, 2004.
[23] 林展民, “以智能合約實現快速醫療保險理賠.” 政治大學資訊科學所碩士班學位論文, 2016.[24] 柯冠宇, “可驗證性模糊傳送協定.” 交通大學資訊科學研究所碩士班學位論文, 2001, 1-49[25] 陳俊名, “基於模糊簽章之可多選電子投票系統.” 長庚大學電機工程所碩士班學位論文, 2013.[26] 陳淵順, “基於模糊簽章之電子投票系統.” 政治大學資訊科學所碩士班學位論文, 2010.[27] 陳姿伶, “雲端伺服器輔助Paillier簽章系統之設計.” 南台科大資訊工程所碩士班學位論文, 2014.
[28] 羅青寅, “公平盲簽章於網路招標系統投標驗標作業的應用與實作.” 中興大學電機工程學系碩士班學位論文, 2007.[29] 蕭勝文, “電子競標系統之研究” 中央大學資訊工程所碩士班學位論文,2003.[30] 行政院公共工程委員會,政府採購領投標系統:http://www/geps.gov.tw
[31] 政治大學選舉研究中心, “實施電子投票成本效益分析架構之研究─以日本、韓國與菲律賓電子投票、韓國與菲律賓電子投票推動情形為例”