共 46 条
[1]
Achenbach D., 2015, USENIX Journal of Election Technology and Systems
[2]
[Anonymous], 2012, 2012 EL VOT TECHN WO
[3]
[Anonymous], 1996, THESIS
[4]
Araujo R., 2010, PRACTICAL SECURE COE, P330, DOI [10.1007/978- 3- 642- 12980-3 20, DOI 10.1007/978-3-642-12980-3_20]
[5]
Benaloh J., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P544, DOI 10.1145/195058.195407
[6]
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme
[J].
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017),
2017,
[7]
SoK: A comprehensive analysis of game-based ballot privacy definitions
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:499-516
[8]
Bernhard D, 2012, LECT NOTES COMPUT SC, V7658, P626, DOI 10.1007/978-3-642-34961-4_38
[9]
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
[J].
2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021),
2021,
:272-291
[10]
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565