A Secure Receipt Issuing Scheme for e-Voting with Improved Usability |
Lee, Yun-Ho
(Information Security Group School of Information and Communication Engineering Sungkyunkwan University)
Lee, Kwang-Woo (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) Park, Sang-Joon (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) Kim, Seung-Joo (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) Won, Dong-Ho (Information Security Group School of Information and Communication Engineering Sungkyunkwan University) |
1 | R.Mercuri, 'Rebecca Mercuri's Statement on Electronic Voting,' http://www.notablesoftware.com/RMstatement.html, 2001 |
2 | D.Chaum, 'Secret-Ballot Receipts: True Voter-Verifiable Elections', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.38-47, Jan. 2004 DOI ScienceOn |
3 | Y.Tsiounis and M.Yung, 'On the Security of ElGamal Based Encryption', Public Key Cryptography 98(PKC'98), LNCS 1431, pp.117-134, 1998 |
4 | C.Karlof, N.Sastry and D.Wagner, 'Cryptographic Voting Protocol : A Systems Perspective', Proc. of 14th USENIX Security Symposium(USENIX2005), pp.33-50, 2005 |
5 | T.ElGamal, 'A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms', IEEE Trans. on Information Theory, vol. IT-31, no. 4, pp.469-472, 1985 |
6 | '전자선거추진협의회 공식 출범', http://www.nec.go.kr/notice/report/, 중앙선거관리위원회, 2005 |
7 | R.Mercuri, 'A Better Ballot Box?', IEEE Spectrum Online, pp.46-50, Oct. 2002 |
8 | C.A.Neff, 'A Verifiable Secret Shuffle and Its Application to E-Voting', Proc. of the 8th ACM Conference on Computers and Communications Security(CCS-8), pp.116-125, 2001 |
9 | D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical Voter-Verifiable Election Scheme', Proc. of 10th European Symposium on Research in Computer Security(ESORICS2005), LNCS 3679, pp.118-139, 2005 |
10 | S.Goldwasser and S.Micali, 'Probabilistic Encryption', Journal of Computer System Sciences(JCSS), vol. 28, no. 2, pp.270-299, Apr. 1984 DOI ScienceOn |
11 | P.Golle, M.Jakobsson, A.Juels, and P.Syverson, 'Universal Re-encryption for Mixnets', CT-RSA 2004, LNCS 2964, pp.163-178, 2004 |
12 | M.Naor and A.Shamir, 'Visual Cryptography', Proc. of Advances in Cryptology (Eurocrypt'94), LNCS 950, pp.1-12, 1995 |
13 | D.Chaum, 'Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms', Comm. of the ACM, vol. 24, no. 2, pp.84-88, Feb. 1981 DOI ScienceOn |
14 | D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical, Voter-Verifiable Election Scheme', Technical Report CS-TR-880, University of Newcastle upon Tyne, 2004 |
15 | D.Boneh and P.Golle, 'Almost Entirely Correct Mixing with Applications to Voting', Proc. of 9th ACM conference on Computer and Communications Security(CCS), 2002 |
16 | P.Paillier, 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes', Proc. of Advances in Cryptology(Eurocryp'99), LNCS 1592, pp.223-238, 1999 |
17 | C.A.Neff and J.Adler, 'Verifiable e-Voting: Indisputable Electronic Elections at Polling Places', http://www.votehere.net/vhti/documentation/VH\_VHTi\_WhitePaper.pdf, VoteHere Inc., 2003 |
18 | D.Evans and N.paul, 'Election Security: Perception and Reality', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.24-31, Jan. 2004 DOI ScienceOn |
19 | R.Cramer and V.Shoup, 'A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack', Crypto'98, LNCS 1462, pp.13-25, 1998 |