|
A. Fujioka, T. Okamoto, and K. Ohta, “A Practical Secret Voting Scheme for Large Scale Elections,” in Proceedings of International Workshop on the Theory and Application of Cryptographic Techniques, pp. 244-251, 1992
|
|
J. Bannet, D. W Price, A. Rudys, J. Singer, and D. S. Wallach, “Hack-a-Vote: Security Issues with Electronic Voting Systems,” IEEE Security & Privacy, Vol. 2, No. 1, pp. 32-37, 2004
|
|
Brennan Center for Justice, Voting Technology Assessment Project, L. D. Norden, “The Machinery of Democracy: Voting System Security, Accessibility, Usability, and Cost,” Brennan Center for Justice at NYU School of Law, 2006
|
|
S. Ibrahim, M. Kamat, and M. Salleh, “Secure E-voting with Blind Signature,” in Proceedings of the 4th National Conference on Telecommunication Technology, pp. 193-197, 2003
|
|
M. Kucharczyk, “Blind Signatures in Electronic Voting Systems,” in Proceedings of International Conference on Computer Networks, pp. 349-358, 2010
|
|
T. Okamoto, “An Electronic Voting Scheme,” Advanced IT Tools, pp. 21-30, 1996
|
|
G. M. Chen, C. H. Wu, W. Han, X. F. Chen, H. Lee, and K. Kim, “A New Receipt-free Voting Scheme based on Linkable Ring Signature for Designated Verifiers,” in Proceedings of International Conference on Embedded Software and Systems Symposia, pp. 18-23, 2008
|
|
S. Flonta, L. C. Miclea, and S. Enyedi, “Electronic Vote Scheme based on Ring Signature,” in Proceedings of 2010 IEEE International Conference on Automation Quality and Testing Robotics (AQTR), Vol. 3, pp. 1-3, 2010
|
|
P. P. Tsang and V. K. Wei, “Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation,” in Proceedings of International Conference on Information Security Practice and Experience, pp. 48-60, 2005
|
|
10Y. F. Wu, “An E-voting System based on Blockchain and Ring Signature,” Master. University of Birmingham, 2017
|
|
E. Fujisaki and K. Suzuki, “Traceable Ring Signature,” in Proceedings of International Workshop on Public Key Cryptography, pp. 181-200, 2007
|
|
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008
|
|
Abu Dhabi Stock Exchange Launches Blockchain Voting (http://www.coindesk.com/abu-dhabi-exchange-blockchain-voting/, last accessed on October 2016)
|
|
Now You Can Vote Online with a Selfie (http://www.businesswire.com/news/home/20161017005354/en/Vote- Online-Selfie/, last accessed on October 2016)
|
|
P. McCorry, S. F. Shahandashti, and F. Hao, “A Smart Contract for Boardroom Voting with Maximum Voter Privacy,” in Proceedings of International Conference on Financial Cryptography and Data Security. Springer, pp. 357-375, 2017
|
|
F. Hao, P. Y. A. Ryan, and P. Zieliński, “Anonymous Voting by Two-Round Public Discussion,” IET Information Security, Vol. 4, No. 2, pp. 62-67, 2010
|
|
G. Wood, “Ethereum: A Secure Decentralised Generalised Transaction Ledger,” Ethereum Project Yellow Paper, Vol. 151, pp. 1-32, 2014
|
|
Z. C. Zhao and T. H. H. Chan, “How to Vote Privately Using Bitcoin,” in Proceedings of International Conference on Information and Communications Security, 2015
|
|
A. B. Ayed, “A Conceptual Secure Blockchain-based Electronic Voting System,” International Journal of Network Security & Its Applications, Vol. 9, No. 3, 2017
|
|
D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology, pp.199-203, 1983
|
|
D. Chaum and E. Van Heyst, “Group Signatures.” in Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, pp. 257-265, 1991
|
|
R. L. Rivest, S. Adi, and T. Yael, “How to Leak a Secret,” in Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, pp. 552-565, 2001
|
|
Ring Signature Efficiency (https://bitcointalk.org/index.php?topic=972541.msg10619684#msg10619684/, last accessed on May 1, 2015)
|
|
A. Elli, G. O. Karame, M. Rosechlin, T. Scherer, and S. Capkun, “Evaluating User Privacy in Bitcoin,” in Proceedings of International Conference on Financial Cryptography and Data Security, pp. 34-51, 2013
|
|
D. Ron and S. Adi, “Quantitative Analysis of the Full Bitcoin Transaction Graph,” in Proceedings of International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, 2013
|