Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 15
Page No. 2716 - 2720

A Study on How to Make a Secure e-Voting Protocol for Elections

Authors : SaeedBeheshtifard

References

Benaloh, J. and D. Tuinstra, 1994. Receipt-free secret-ballot elections. Proceedings of the 26th Annual ACM Symposium on Theory of Computing, May 23-25, 1994, ACM, New York, USA., pp: 544-553.

Boyd, C., 1988. Some applications of multiple key ciphers. Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, May 25-27, Springer, Berlin, Germany, ISBN:978-3-540-50251-7, pp: 455-467.

Chaum, D., 1983. Blind Signatures for Untraceable Payments, Advances in Cryptology-Crypto '82. Springer-Verlag, Santa Barbara, CA, USA., pp: 199-203.

Chaum, D., 1987. Blinding for unanticipated signatures. Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, April 13-15,1987, Springer, Berlin, Germany, ISBN:978-3-540-19102-5, pp: 227-233.

Chaum, D., 1988. Elections With Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. In: Advances in Cryptologyd Eurocrypt 88, C.G., Guenther (Ed.). Springer, Verlag, Berlin, Germany, pp: 177-182.

Chaum, D.L., 1981. Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM, 24: 84-88.
CrossRef  |  

Cramer, R., R. Gennaro and B. Schoenmakers, 1997. A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Trustworthy Global Computing, Fumy, W. (Ed.). Springer-Verlag, Berlin Heidelberg, pp: 103-118.

Cranor, L.F. and R.K. Cytron, 1997. Sensus: A security-conscious electronic polling system for the internet. Proceedings of the Thirtieth Hawaii International Conference on System Sciences, January 7-10, 1997, IEEE, Los Alamitos, California, ISBN:0-8186-7743-0, pp: 561-570.

DeMillo, R.A., N.A. Lynch and M.J. Merritt, 1982. Cryptographic protocols. Proceedings of the 14th Annual ACM Symposium on theory of Computing, May 5-7, 1982, San Francisco, California, United States, pp: 383-400.

Fujioka, A., T. Okamoto and K. Ohta, 1992. A practical secret voting scheme for large scale elections. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, December 13-16, 1992, Queensland, Australia, pp: 244-251.

Jan, J.K., C.C. Tai, 1997. A secure electronic voting protocol with IC cards. J. Syst. Software, 39: 93-101.

Jang, H.J., 1996. A conventional approach to secret balloting in computer networks. Comput. Secur., 15: 249-262.
CrossRef  |  Direct Link  |  

Juang, W. and C. Lei, 1997. A secure and practical electronic voting scheme for real world environment. IEICE Trans. Fundam., E80-A: 64-71.

Juang, W.S. C.L. Lei and H.T. Liaw, 2001. Fair blind threshold signatures based on discrete logarithm. Comput. Syst. Sci. Eng., 16: 371-379.
Direct Link  |  

Juang, W.S. and C.L. Lei, 1996. A collision-free secret ballot protocol for computerized general elections. Comput. Secur., 15: 339-348.
CrossRef  |  Direct Link  |  

Juang, W.S., C.L. Lei and H.T. Liaw, 2002. A verifiable multi-authority secret election allowing abstention from voting. Comput. J., 45: 672-682.
CrossRef  |  Direct Link  |  

Karro, J. and J. Wang, 1999. Towards a practical secure and very large scale online election. Proceedings of the 15th Annual Conference on Computer Security Applications (ACSAC'99), December 6-10, 1999, IEEE, Phoenix, Arizona, ISBN:0-7695-0346-2, pp: 161-169.

Neff, C.A., 2001. A verifiable secret shuffle and its application to e-voting. Proceedings of the 8th ACM Conference on Computer and Communications Security, November 5-8, 2001, Philadelphia, PA., USA., pp: 116-125.

Niemi, V. and A. Renvall, 1994. Cryptographic Protocols and Voting. In: Results and Trends in Theoretical Computer Science, Juliani, K.,H. Maurer and G. Rozenberg (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-58131-4, pp: 307-316.

Nurmi, H., A. Salomaa and L. Santean, 1991. Secret ballot elections in computer networks. Comput. Secur., 10: 553-560.
CrossRef  |  Direct Link  |  

Pfleeger, C.F. and S.L. Pfleeger, 1989. Security in Computing. Prentice-Hall, New Jersey.

Riera, A., J. Borrell and J. Rifa, 1998. An uncoercible verifiable electronic voting protocol. Proceedings of the SEC'98 International Conference on Information Security, August 31-September 2, 1998, Osterreichische Computer Gesellschaft (OCG)-Austrian Computer Society, Austria, ISBN:3-85403-116-5, pp: 206-215.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved