User Tools

Site Tools


papers_and_other_documentation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

papers_and_other_documentation [2019/05/27 05:34]
papers_and_other_documentation [2019/05/27 05:34] (current)
Line 1: Line 1:
 +Ximix is drawing on the work presented in a number of publications.
 +
 +This is the current list of those available:
 +
 +  * {{:​rpc.pdf|"​Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking"​}} Markus Jakobsson, Ari Juels, Ronald L. Rivest, 11th USENIX Security Symposium, 2002.
 +  * {{:​pedersen.pdf|"​A Threhold Cryptosystem without a Trusted Party (Extended Abstract)"​}} T. P. Perdersen, Springer-Verlag,​ 1998.
 +  * {{:​cramer_etal_1997.pdf|"​A Secure and Optimally Efficient Multi-Authority Election Scheme"​}} R. Cramer, R. Gennaro, B. Schoenmakers,​ CGS Journal, October, 1997.
 +  * [[https://​citeseerx.ist.psu.edu/​viewdoc/​download?​doi=10.1.1.67.9913.pdf|"​A Robust Threshold Elliptic Curve Digital Signature Providing a New Verifiable Secret Sharing Scheme"​]] M. H. Ibrahim, I. A. Ali, I. I. Ibrahim, A. H. El-sawi.
 +  * [[https://​www.iacr.org/​archive/​asiacrypt2001/​22480516.pdf|"​Short signatures from the Weil pairing"​]] D. Boneh, B. Lynn, and H. Shacham, AsiaCrypt 2001.
 +  * [[https://​eprint.iacr.org/​2012/​063.pdf|"​Randomized Partial Checking Revisited"​]] S. Khazaei, D. Wikstrom, ​ Cryptology ePrint Archive, Report 2012/063, 2012.
 +  * [[https://​www.uclouvain.be/​crypto/​services/​download/​publications.pdf.87e67d05ee05000b.6d61696e2e706466.pdf|"​How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios"​]] D. Bernhard, O. Pereira, B, Warinschi, volume 7658 of Lecture Notes in Computer Science, pages 626-643. 2012.
 +   * [[https://​dss.in.tum.de/​files/​brandt-research/​millionaire.pdf|"​Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption"​]] F. Brandt, ​ Proceeding ICISC'​05 Proceedings of the 8th international conference on Information Security and Cryptology, Pages 32-47 Springer-Verlag. 2006.
 +   * [[https://​citeseerx.ist.psu.edu/​viewdoc/​download?​doi=10.1.1.44.6345&​rep=rep1&​type=pdf|“Secure Distributed Key Generation for Discrete-Log Based Cryptosystems”]] ​ R. Gennaro, S Jarecki, H. Krawczyk, T. Rabin, Journal of Cryptology, 2007. 
 +
 +Further reading:
 +
 +  * {{:​IntroToCrypto.ppt|"​Introducing Cryptography for Voting"​}} V. Teague, 617 Crytpography and Security Lecture Notes, University of Melbourne.
 +
 +Please note the content on this page is provided for research purposes and remains the property of the respective copyright holders.
  
papers_and_other_documentation.txt · Last modified: 2019/05/27 05:34 (external edit)