참고문헌
- D.Evans. N.Paul. 'Election Security: Perception and Reality,' IEEE S&P Magazine Jan/Feb, pp.24-31. 2004
- D.Chaum, 'Secret-Ballot Receipts: True Voter-Verifiable Elections,', IEEE S&P Magazine Jan/Feb, pp.38-47, 2004
- J. Bannet, D.W.Price, A.Rudis, J.Singer, S.Wallach. 'Hack-a-Vote: Security Issues with Electronic Voting Systems,' IEEE S&P Magazine Jan/Feb, pp.32-37, 2004
- B.C.Lee, K.J.Kim, 'Receipt-Free Electronic Voting Scheme with a TamperResistant Randomizer.' ICISC 2002, LNCS 2587, Springer-Verlag, pp. 389-406, 2002
- Ahmad Baraani-Dastjerdi. Josef Pieprzyk and Reihaneh Safavi-Naini. 'A Secure Voting Protocol Using Threshold Schemes,' Proceedings of COMPSAC'95, pp.143-148, 1995
- Patrick Horster, Markus Michels and Holger Petersen, 'Blind Multisignature Schemes and Their Relevance for Electronic Voting,' Proceedings of COMPSAC'95, pp.149-155, 1995
- Atsushi Fujioka, Tatsuaki Okamoto, and Kazuo Ohta. 'A Practical Secret Voting Scheme for Large Scale Elections,' In Advances in Cryptology, Proceedings of AUSCRYPT'92, 1992
- Colin Boyd, 'A New Multiple Key Cipher and an Improved Voting Scheme,' In Advances inn Cryptology, Proceedings of EUROCRYPT'89, LNCS 434, pp.617-625, 1990
- D.Chaum, 'Untraceable Electronic Mail. Return Addresses and Digital Pseudonyms ,' Communications of the ACM, Vol. 24, No.2, pp.84-88, 1981 https://doi.org/10.1145/358549.358563
- David Chaum. 'Undeniable Signatures,' Proceedings of CRYPTO'89, pp.212-216, 1989
- S.H.Yun, H.W.Lee. 'The Efficient Multipurpose Convertible Undeniable Signature Scheme.' LNAI 3683, Springer-Verlag, pp.325-331. 2005
- S.H.Yun, S.J.Lee, 'An Electronic Voting Scheme based on Undeniable Blind Signature Scheme,' Proceedings of 37th IEEE Carnahan Conference on Security Technology, pp.163-167, 2003
- S.H.Yun, H.W.Lee, 'The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme,' LNCS 3481. Springer-Verlag, pp.391-400, 2005