next up previous
Next: About this document Up: A New Practical Secure Previous: Conclusion

References

1
Bruce Schneier, Applied Cryptography - Protocols, Algorithms, and Source Code in C, 2nd Edition, 1996.

2
Gilles Brassard and Claude Crepeau, All-or-Nothing Disclosure of Secrets, Lecture Notes in Computer Science 263, Advances in Cryptology, Crypto'86, pp 234-238.

3
Hannu Nurmi, Arto Salomaa, and Lila Santean, Secret Ballot Elections in Computer Networks, Computers and Security, 10(1991), pp 553-560.

4
D. Chaum, Security without Identification: Transaction systems to make big brother Osolete, Communications of the ACM Oct. 1985, Vol. 28, No. 10.

5
B. Fujiook, T. Okamoto, and K. Ohta, A Practical Secret Voting Scheme for Large Scale Elections, Advances in Cryptology, Auscryupt'92.

6
Shafi Goldwasser and Silvio Micali, Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information, ACM, 1982, pp366-377.

7
Josh Benaloh, Verifiable Secret-Ballot Elections, Ph.D. Thesis presented at Yale University, New Haven, 1987.

8
Josh Benaloh and Dwight Tuinstra, Receipt-Free Secret-Ballot Elections, Proceeding of the 26th Symposum, on the Theory of Computing, 1994.

9
Kazue Sako and Joe Kilian, Receipt-Free Mix-Type Voting Scheme - A Practical Solution to The Implementation of Voting Booth, Lecture Notes in Computer Science, Advances in Cryptology - EUROCRYPT'95, 1995 pp393-403.

10
Micheal J. Radwin, An Untraceable, Universally Verifiable Voting Scheme, http://slimy.com/ mjr/projects/voting.html, 1995.

11
Ronald L. Rivest, design and implement an electronic voting scheme, http://theory.lcs.mit.edu/ cis/darpa/home.html, 1997.

12
Lorrie Faith Cranor and Ron K. Cytron, Sensus: A Security-Conscious Electronic Polling System for the Internet, Proceedings of the Hawai`i International Conference on System Sciences, January 7-10, 1997, Wailea, Hawai`i,

13
Lorrie Faith Cranor,Electronic Voting: Computerized polls may save money, protect privacy, Crossroads 2.4 April 1996.

14
David L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, Vol. 24, No. 2, Feb. 1981.


Qi He
Thu Dec 25 16:06:46 EST 1997