Multi-Authority Secret-Ballot Elections with Linear Work
- 1 January 1996
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Proofs of Partial Knowledge and Simplified Design of Witness Hiding ProtocolsPublished by Springer Science and Business Media LLC ,2007
- Provably Secure and Practical Identification Schemes and Corresponding Signature SchemesPublished by Springer Science and Business Media LLC ,2001
- Cryptographic Capsules: A Disjunctive Primitive for Interactive ProtocolsPublished by Springer Science and Business Media LLC ,2000
- How To Prove Yourself: Practical Solutions to Identification and Signature ProblemsPublished by Springer Science and Business Media LLC ,2000
- Achieving independence efficiently and securelyPublished by Association for Computing Machinery (ACM) ,1995
- New group signature schemesPublished by Springer Science and Business Media LLC ,1995
- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and MemoryLecture Notes in Computer Science, 1988
- Distributing the power of a government to enhance the privacy of votersPublished by Association for Computing Machinery (ACM) ,1986
- A robust and verifiable cryptographically secure election schemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981