Author:
Szabo Robert,Telcs Andras
Publisher
Springer International Publishing
Reference29 articles.
1. Kiayias , A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002. LNCS, vol. 2274, pp. 141–158, Springer (2002)
2. LNCS;R Wen,2009
3. Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Financial Cryptography 2000, pp. 90–104 (2000)
4. Cramer, R., Damgard, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, EUROCRYPT 2001, pp. 280–299. Springer (2001)
5. Hirt, M.: Multi-party computation: efficient protocols, general adversaries, and voting. Ph.D. thesis, ETH ZURICH (2001)