共 13 条
- [1] Benaloh J., Tuinstra D., Receipt-free secret-ballot elections, Proc of the 26th ACM Symposium on Theory of Computing, pp. 544-553, (1994)
- [2] Groth J., Efficient maximal privacy in boardroom voting and anonymous broadcast, Proc of the 8th Int'l Conf on Financial Cryptography (FC2004), LNCS 3110, pp. 90-104, (2004)
- [3] Cramer R., Franklin M., Schoenmakers B., Multi-authority secret-ballot elections with linear work, Advances in Cryptology-Eurocrypt'96, LNCS 1070, pp. 72-83, (1996)
- [4] Cramer R., Gennaro R., Schoenmakers B., A secure and optimally efficient multi-authority election scheme, Advances in Cryptology-Eurocrypt'97, LNCS 1223, pp. 103-118, (1997)
- [5] Damgard I., Jurik M., A generalisation, a simplication and some applications of Paillier's probabilistic public-key system, The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001), LNCS 1992, pp. 119-136, (2001)
- [6] Goldreich O., Secure multi-party computation (working draft), (1998)
- [7] Rosen K.H., Elementary Number Theory and Its Applications, (1984)
- [8] Cohen H., A Course in Computational Algebraic Number Theory, (1993)
- [9] Knuth D.E., The Art of Computer Programming: Semi-Numerical Algorithms, (1981)
- [10] Benaloh J.C., Secret sharing homomorphisms: Keeping shares of a secret secret, Advances in Cryptology-Crypto'86, LNCS 263, pp. 251-260, (1986)