|
[Abe98] M. Abe, “Universally verifiable MIX with verification work independent of the number of MIX servers”, Advanced in Cryptology – Eurocrypt 1998, LNCS 1403, 1998. [Acq04] A. Acquisti, “Receipt-Free Homomorphic Elections and Write-in Ballots”, 2003, www.heinz.cmu.edu/acquisti/research.htm. [AS02] M. Abe and K. Suzuki, “M+1-st Price Auction Using Homomorphic Encryption”, PKC 2002, LNCS 2274, pp. 115-124, 2002. [Arr63] K. J. Arrow. “Individual Values and Social Choice”. John Wiley & Sons, New York, 2nd Ed. 1963. [BFPSP01] O. Baudron, P. Fouque, D. Pointcheval, J. Stern, and G. Poupard, “Practical Multi-Candidate Election System”, ACM 20-th Symposium on Principle of Distributed Computing, PODC’01, 2001. [BF88] Manuel Blum, Paul Feldman, “Non-Interactive Zero Knowledge and It’s applications”, In Proceedings of the twentieth ACM Syrup. Theory of Computing, STOC, pp. 103-112, 1988. [Ben87] J. C. Benaloh, “Verifiable Secret Ballot Elections”, Ph.D. thesis, Yale University, 1987. [BG93] M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols”, In Proc. 1st ACM Conference on Computer and Communications Security, 1993. [Cha81] D. Chaum, “Untraceable electronic mail, return address, and digital pseudonym”, Communication of ACM 24, Feb 1981. [Cha83] D. Chaum, “Blind signatures for untraceable payments”, Advanced in Cryptology – Crypto 1982, pp. 199-203, 1982. [Cha02] D. Chaum, “Secret-ballot receipts and transparent integrity”, Draft, 2002. www.vreceipt.com/article.pdf. [CP92] D. Chaum and T. Pedersen, “Wallet Databases with Observers”, Advanced in Cryptology – Crypto 1992, pp. 89-105, 1992. [CDNO97] R. Canetti, C. Dwork, M. Naor and R. Ostrovsky, Denyable Encryption, Advances in Cryptology – CRYPTO’97, LNCS 1294, Springer, 1997, pp. 90-104. [CGS97] R. Cramer, R. Gennaro, and B. Schoenmakers, “A Secure and Optimally Efficient Multi-Authority Election Scheme”, Advanced in Cryptology – Eurocrypt 1997, LNCS 1233, pp. 119-136, 1997. [CP92] D. Chaum and T. P. Pedersen, “Wallet Databases with Observers”. CRYPTO 1992: 89-105 [EG85] T. ElGamal, “A Public-key Cryptosystem and Signature Scheme Based on Discrete Logarithms”, IEEE Trans. on Information Theory, Vol. IT-31, pp. 469-472, 1985. [FS86] A. Fiat and A. Shamir, “How To Prove Yourself: Practical Solutions to Identification and Signature Problems”, Advances in Cryptology: Proc. Crypto’86, pp.186-194, 1986. [Fel87] P. Feldman, “A practical scheme for non-interactive verifiable secret sharing”, In Proc. 28th IEEE Symposium on Foundations of Computer Science (FOCS’87), pages 427-437, IEEE Computer Society, 1987. [FOO92] A. Fujioka, T. Okamoto, and K. Ohta, “A practical secret voting scheme for large scale elections”, Advanced in Cryptology – AUSCRYPT’92, 1992. [GK03] S. Goldwasser and Y. T. Kalai, “On the (In)security of the Fiat-Shamir Paradigm”, Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science(FOCS’03). [GMW87] O. Goldreich, S. Micali, and A. Wigderson, “How to Play Any Mental Game”, ACM STOC’87, 1987 [GMR85] Goldwasser. S, S. Micali and C. Rackoff, “Knowledge Complexity of Interactive Proof Systems”, Proceedings of STOC’85, pp. 291-304. [Gro04] J. Groth, “Evaluating Security of Voting Schemes in the Universal Composability Frmework”, Proc. ACNS’04, 2004. [Gen99] R. Gennaro et al. “Secure Distributed Key Generation for Discrete-Log Based Cryptosystems”, Advances in Cryptology: Proc. Eurocrypt’99, pp. 293-310, 1999. [HS00] M. Hirt and K. Sako, “Efficient receipt-free voting based on homomorphic encryption”, Advanced in Cryptology – Eurocrypt’00, 2000. [HK02] Hevia and Kiwi, “Electronic Jury Voting Protocols”. Proc. of the 5th Latin American Symposium on Theoretical Informatics (LATIN'02), ancun, exico, pp. 415-429 [JJ00] M. Jakobsson and A. Juels, “Mix and Match: Secure Function Evaluation via Ciphertexts”, Advanced in Cryptology – Asiacrypt’00, pp. 162-177, 2000. [JJ99] M. Jakobsson and A. Juels, “Millimix: Mixing in Small Batches”, Tech. Rep. 99-33, DIMACS, 1999. [JJ02] A. Juels and M. Jakobsson, “Coercion-resistant electronic elections”, 2002. citeseer.nj.nec.com/555869.html. [KY04] A. Kiayias and M. Yung, “The vector-ballot e-voting approach”, 2004. Mimeo, University of Connecticut and Columbia University. [Nef03] A. Neff, “Detecting malicious poll site voting clients”, 2003. http://www.votehere.net/. [Ped91] T. P. Pedersen, “A Threshold Cryptosystem without a Trusted Party”, Advanced in Cryptology – Eurocrypt 1991, pp. 522-526, 1991. [Pai99] P. Paillier, “Public-Key Cryptosystems Based on Discrete Logarithms Residues”. In Eurocrypt’99, LNCS 1592. Springer-Verlag, 1999. [Rad95] M. J. Radwin, “An untraceable, universally verifiable voting scheme”, 1995, available at http://www.radwin.org/michael/projects/voting.html. [Riv91] R. Rivest, “Electronic Voting”, Financial Cryptography’91, 1991. [Rja02] Z. Rjaskova, “Electronic Voting Schemes”, Ms Thesis, Comenius University, Bratislava, 2002. [Sha79] Adi Shamir, “How to share a secret”, Communication of the ACM, 22:612-613, 1979. [Sch91] C. P. Schnorr, “Effficient Signature Generation by Smart Cards”, Journal of Cryptology 1991. [Sch99] Berry Schoenmakers. “A simple publicly verifiable secret sharing scheme and its application to electronic voting”, Advances in Cryptology-CRYPTO, 1666 of Lecture Notes in Computer Science: 148-164, 1999. [TL03] P.-Y. Ting, Y.-T. Lee, C.-Y. Chen “On The Public Verifiability of an M+1-st Price Auction Using Homomorphic Encryption”, Taiwan ISC, 2004.
|