Page 43 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 43

The Witness-Voting System
                          13. Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons,
                             New York (1991)
                          14. Gerck, E.: Voting With Witness Voting. In: WOTE 2001 Seminar, Tomales Bay,
                             Calif, Caltech-MIT Voting Technology Project (2001), Copy online at  35
                             http://www.vote.caltech.edu/wote01/pdfs/gerck-witness.pdf and
                             http://safevote.com/doc/gerck-witness.pdf
                          15. Feghhi, J., Feghhi, J., Williams, P.: Digital Certificates: Applied Internet Security.
                             In: Gerck, E. (ed.) Trust Points, pp. 194–195. Addison-Wesley, Reading (1998)
                             ISBN 0-20-130980-7, Copy and additional material online at
                             http://mcwg.org/mcg-mirror/trustdef.htm,
                             http://nma.com/papers/it-trust-part1.pdf
                          16. Gerck, E.: Certification: Extrinsic, Intrinsic and Combined. Published online by
                             the MCG (1997), Copy online at, http://mcwg.org/mcg-mirror/cie.htm
                          17. Gerck, E.: Private, secure and auditable Internet voting. In: Secure Electronic
                             Voting, ch. 11, ibid
                          18. Gerck, E.: Voting Systems: from Art To Science. In: Caltech MIT Voting Technol-
                             ogy Conference, Pasadena, Calif. (2001), Copy online at
                             http://www.hss.caltech.edu/ ~ voting/gerck_present.ppt,
                             http://safevote.com/doc/gerck_present.ppt
                          19. Saltman, R.G.: Independent Verification: Essential Action to Assure Integrity in
                             the Voting Process. NIST Report, Order No. SB134106W0703 (2006)
                          20. Saltman, R.G.: Effective Use of Computing Technology in Vote-Tallying, Report
                             NBSIR 75-687 (republished as NBS Special Publication 500-30, 1978), National
                             Institute of Standards and Technology, Gaithersburg, MD (1975)
                          21. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital
                             Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
                          22. Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election
                             scheme. In: Proc. 26th IEEE Symposium on Foundations of Computer Science
                             (FOCS ’85), pp. 372–382. IEEE Computer Society, Los Alamitos (1985)
                          23. Benaloh, J.: Verifiable Secret-Ballot Elections. PhD thesis, Yale University, Dept.
                             of Computer Science (1987)
                          24. Mercuri, R.T.: Physical Verifiability of Computer Systems. In: Proc. of the 5th
                             International Computer Virus and Security Conference (March 1992)
                          25. Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-authority secret bal-
                             lot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS,
                             vol. 1070, pp. 72–83. Springer, Heidelberg (1996)
                          26. Benaloh, Tuinstra: Receipt-free Secret-ballot Elections. In: STOC ’94, pp. 544–553
                             (1994)
                          27. Gerck, E.: Contra Costa County Shadow Election Report. Final Project Report
                             to the California Secretary of State (2000), Copy online at
                             http://safevote.com/doc/SafevoteContraCostaCountyElection.pdf,
                             http://safevote.com/onlineballot.htm
                          28. Neff, C.A.: A Verifiable Secret Shuffle and its Application to E-Voting. In: Pro-
                             ceedings ACM-CCS 2001, pp. 116–125 (2001)
                          29. Jakobsson, M., Juels, A., Rivest, R.L.: Making Mix Nets Robust for Electronic
                             Voting by Randomized Partial Checking. In: Proc. Usenix Security, pp. 339–353
                             (2002) IACR reprint 2002/025
                          30. Kiayias, A., Yung, M.: Robust Verifiable Non-Interactive Zero-Sharing: A Voting
                             Utility For Enhanced Privacy. In: Secure Electronic Voting, ch. 9, ibid
                          31. Mercuri, R.T., Neumann, P.G.: Verification of Electronic Balloting Systems. In:
                             Secure Electronic Voting, ch. 3, ibid
   38   39   40   41   42   43   44   45   46   47   48