[1]
Chaum, D.L., Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the Acm, 1981. 24(2): pp.84-90.
DOI: 10.1145/358549.358563
Google Scholar
[2]
Fujioka, A., T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. 1993: Springer.
Google Scholar
[3]
Neff, C.A. A verifiable secret shuffle and its application to e-voting. 2001: ACM.
Google Scholar
[4]
Lee, B. and K. Kim, Receipt-free electronic voting scheme with a tamper-resistant randomizer. Information Security and Cryptology¡ªICISC 2002, 2003: pp.389-406.
DOI: 10.1007/3-540-36552-4_27
Google Scholar
[5]
Adida, B. and C.A. Neff. Ballot casting assurance. 2006: USENIX Association.
Google Scholar
[6]
Chaum, D. and U. o.N. u.T.C. Science, Secret ballot elections with unconditional integrity. 2007: Citeseer.
Google Scholar
[7]
Delaune, S., S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security, 2009. 17(4): pp.435-487.
DOI: 10.3233/jcs-2009-0340
Google Scholar
[8]
Boneh, D. and M. Franklin. Identity-based encryption from the Weil pairing. in CRYPTO 2001. 2001: Springer.
DOI: 10.1007/3-540-44647-8_13
Google Scholar
[9]
Boneh, D., X. Boyen, and E.J. Goh, Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology¨CEUROCRYPT 2005, 2005: pp.440-456.
DOI: 10.1007/11426639_26
Google Scholar
[10]
Delerablée, C., P. Paillier, and D. Pointcheval, Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. Pairing-Based Cryptography¨CPairing 2007, 2010: pp.39-59.
DOI: 10.1007/978-3-540-73489-5_4
Google Scholar