1. Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM (24), 84–88 (1981)
2. Demillo, R., Merritt, M.: Protocols for Data Security. Computer 02, 39 (1983)
3. Benaloh, J., Tuinstra, D.: Receipt-free Secret-ballot Elections. In: Proccedings of the Twentysixth Annual ACM Symposium on the Theory of Computing, pp. 544–553. ACM Press, New York (1994)
4. Iverson, K.R.: A cryptographic scheme for computerized general elections. LNCS 330, 405–419 (1991)
5. Sako, K.: Electronic voting system with objection to the center. In: Proccedings of the Symposium on Cryptography and Information Security, Tateshina, pp. 92–130 (1992)