Secure Selection Protocols

作者: Kapali Viswanathan , Colin Boyd , Ed Dawson

DOI: 10.1007/10719994_11

关键词:

摘要: The process of selection is omnipresent in the real world and modeling this as a cryptologic protocol will enable cross use techniques among similar applications, which eventually lead to better understanding refinement these applications. We present proposal for specialised with anonymity security service. An area its application anonymous peer review, where no should know identity reviewer.

参考文章(23)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Yair Frankel, Yiannis Tsiounis, Moti Yung, Indirect Discourse Proof: Achieving Efficient Fair Off-Line E-cash international cryptology conference. pp. 286- 300 ,(1996) , 10.1007/BFB0034855
Holger Petersen, Guillaume Poupard, Efficient scalable fair cash with off-line extortion prevention international conference on information and communication security. pp. 463- 477 ,(1997) , 10.1007/BFB0028503
Stefan Brands, Untraceable Off-line Cash in Wallets with Observers (Extended Abstract) international cryptology conference. pp. 302- 318 ,(1993)
Yair Frankel, Yiannis Tsiounis, Moti Yung, Fair Off-Line e-cash Made Easy international cryptology conference. pp. 257- 270 ,(1998) , 10.1007/3-540-49649-1_21
Valtteri Niemi, Ari Renvall, How to Prevent Buying of Votes in Computer Elections international cryptology conference. pp. 164- 170 ,(1994) , 10.1007/BFB0000432
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Stefan Brands, Untraceable off-line cash in wallet with observers international cryptology conference. pp. 302- 318 ,(1994) , 10.1007/3-540-48329-2_26
Yvo Desmedt, Society and Group Oriented Cryptography: A New Concept international cryptology conference. pp. 120- 127 ,(1987) , 10.1007/3-540-48184-2_8
Tatsuaki Okamoto, Receipt-Free Electronic Voting Schemes for Large Scale Elections international workshop on security. pp. 25- 35 ,(1997) , 10.1007/BFB0028157