Computer Science ›› 2015, Vol. 42 ›› Issue (8): 180-184.
Previous Articles Next Articles
LUO Fen-fen, LIN Chang-lu, ZHANG Sheng-yuan and LIU Yi-ning
[1] Chaum D.Untraceable electronic mail,return addresses,and digi-tal pseudonyms[J].Communications of the ACM,1981,24(2):84-88 [2] Cohen J,Fisher M.A robust and verifiable cryptographically security election scheme[C]∥Proceedings of the 26th ACM Symposium on Foundations of Computer Science.1985:372-382 [3] Benaloh J,Tuinstra D.Receipt-free secret-ballot elections(ex-tended abstract)[C]∥Proceedings of the 26th ACM Sympo-sium on Theory of Computing.1994:544-553 [4] Iversen K R.A cryptographic scheme for computerized general elections[M]∥Advances in Cryptology-CRYPTO’91.Spinger,1992:405-419 [5] Sako K,Kilian J.Secure voting using patially compatiable homomorphisms[M]∥Advances in Cryptology-CRYPTO’94.Springer,1994:405-419 [6] Essex A,Hengartner U.Hover:Trustworthy elections withhash-only verification[J].IEEE Security & Privacy,2012,10(5):18-24 [7] Chen X,Wu Q,Zhang F.New receipt-free voting scheme using double-trapdoor commitment[J].Information Sciences,2011,1(8):1493-1502 [8] Rui J,Paulo F,Carlos R.EVIV:An end-to-end verifiable internet voting system[J].Computers & Security,2013,32(2):170-191 [9] Li C,Hwang M,Liu C.An electronic voting protocol with deniable authentication for mobile ad hoc networks[J].Computer Communications,2008,31(10):2534-2540 [10] Francesc S,Josep M M,Jordi P,et al.Simple and efficient hash-based verifiable mixing for remote electronic voting[J].Compu-ter Communications,2010,33(6):667-675 [11] Chung Y,Wu Z.Casting ballots over internet connection against bribery and coercion[J].Computer Journal,2012,55(10):1169-1179 [12] Fujioka A,Okamoto T,Ohta K.A practical secret voting scheme for large scale elections[M]∥Advances in Cryptology-AUSCRYPT’92.Springer,1993:615-619 [13] 谢金宝,刘晖波.电子选举系统的基本框架与信息流程[J].计算机工程,2000(S1):97-102 Xie Jin-bao,Liu Hui-bo.A Basic Frame and Information Flow of Electronic Vole Model[J].Computer Enginering,2000(S1):97-102 [14] 陈晓峰,王继林,王育民.基于半信任模型的无收据的电子投票[J].计算机学报,2003,26(5):557-662 Chen Xiao-feng,Wang Ji-lin,Wang Yu-min.Receipt-Free Electronic Voting Based on Semi-Trusted Model[J].Journal of Computers,2003,26(5):557-662 [15] 范安东,孙琦,张杨松.基于环签名的匿名电子投票方案[J].四川大学学报(工程科学版),2008,40(1):113-117 Fan An-dong,Sun Qi,Zhang Yang-song.The Scheme and Implementation of Anonymous Electronic Voting Based on Ring Signature[J].Journal of Sichuan University(Engineering Science Edition),2008,40(1):113-117 [16] 夏静波,张四兰,陈建华.一个无收据的高效电子选举方案[J].武汉大学学报(理学版),2006,52(3):340-344 Xia Jing-bo,Zhang Si-lan,Chen Jian-hua.A Receipt Free Electronic Voting Scheme[J].Journal of Wuhan University(Natural Science Edition),2006,52(3):340-344 [17] 郭玲玲,谷利泽,李忠献.基于群盲签名的无收据电子投票方案[C]∥2009年中国高校通信类院系学术研讨会论文集.2009 Guo Ling-ling,Gu Li-ze,Li Zhong-xian.The Scheme of non-receipt Electronic Voting Based on Group and Blind Signature[C]∥Proceedings of Academic Conference on Communications in China Colleges and Universities.2009 [18] 陈晓洪.基于安全多方计算的电子投票系统应用研究[D].南京:南京理工大学,2010 Chen Xiao-hong.The Stability of A New Lü Chaotic System with A Sort of Parameters[D].Nanjing:Nanjing University of Science and Technology,2010 [19] 叶炜,吕锋.FOO协议及其在电子投票系统中的改进[D].武汉:武汉理工大学,2009 Ye Wei,Lv Feng.The Improvement of the FOO Protocol and Its Application in Electronic Voting System[D].Wuhan:Wuhan University of Technology,2009 [20] 邹秀斌,崔永泉,付才.一种基于门限的电子投票方案[J].计算机科学,2012,39(7):39-43 Zou Xiu-bin,Cui Yong-quan,Fu Cai.Threshold-based Electronic Voting Scheme[J].Computer Science,2012,39(7):39-43 |
No related articles found! |
|