1 |
S. Goldwasser and S. Micali. "Probabilistic encryption," Journal of Computer and System Sciences. vol. 28, issue 2, pp. 270-299, Apr. 1984. Preliminary version in 14th Annual ACM Symposium on Theory of Computing (STOC).
DOI
ScienceOn
|
2 |
K. Sako and J. Kilian. "Receipt-free mix-type voting scheme: A practical solution to the implementation of a voting booth," Advances in Cryptology - EUROCRYPT '95, Springer LNCS 921 (1995), 393-403.
|
3 |
R. Canetti, U. Feige, O. Goldreich, and M. Naor. "Adaptively secure multi-party computation," STOC (1996), pp. 639-648.
|
4 |
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. " Deniable encryption," CRYPTO, pp 90-104. 1997.
|
5 |
J. Benaloh and D. Tuinstra. "Uncoercible communication," Technical Report TR-MCS-94-1, Clarkson University, March 1994.
|
6 |
M. H. Ibrahim: "A method for obtaining deniable Public-Key Encryption," Trans. On International Journal of Network Security (IJNS), vol. 8, no. 1. pp 1-9, Jan 2009.
|
7 |
R. Cramer, R. Gennaro, and B. Schoenmakers, "A secure and optimally efficient multi-authority election scheme," Eurocrypt '97, pp. 103-118, 1997.
|
8 |
M. Hirt, and K. Sako, "Efficient receipt-free voting based on homomorphic encryption," Eurocrypt '00, pp. 539-556, 2000.
|
9 |
J. Howlader and S. Basu: "Sender-Side Public key Deniable Encryption Scheme," in Proc. of International Conference on Advances in Recent Technologies in Communication and Computing, pp 9-13, 2009.
|
10 |
G. J. Fuchsbauer, "An Introduction to Probabilistic Encryption," Osjecki Matematicki List 6, pp 37-44, 2006.
|
11 |
A. O'Neill, C. Peikert, and B. Waters. "Bi-deniable public-key encryption," Manuscript (2010).
|
12 |
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity," Classes Advances in Computer Science - EUROCRYPT'99, pp 223-238, Springer-Verlag, 1999.
|