1. J.D.C. Benaloh, Verifiable secret-ballot elections, Technical Report 561, Computer Science Department, Yale University (1987).
2. D. Chaum, Election with unconditionally-secret ballots and disruption equivalent to breaking RSA, in:Lecture Notes in Computer Science, Vol. 330, ed. C.G. Gunther (Springer, Berlin/Heidelber/New York, 1988) pp. 177–182.
3. W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inf. Theory IT-22(1976)644–654.
4. K.R. Iversen, A cryptographic scheme for computerized general elections (extended abstract),Crypto '91, Session 9: Secure Computation Protocols.
5. H. Nurmi and A. Salomaa, A cryptographic approach to the secret ballot, Behavioral Sci. 36(1991)34–40.