Page 43 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 43
The Witness-Voting System
13. Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons,
New York (1991)
14. Gerck, E.: Voting With Witness Voting. In: WOTE 2001 Seminar, Tomales Bay,
Calif, Caltech-MIT Voting Technology Project (2001), Copy online at 35
http://www.vote.caltech.edu/wote01/pdfs/gerck-witness.pdf and
http://safevote.com/doc/gerck-witness.pdf
15. Feghhi, J., Feghhi, J., Williams, P.: Digital Certificates: Applied Internet Security.
In: Gerck, E. (ed.) Trust Points, pp. 194–195. Addison-Wesley, Reading (1998)
ISBN 0-20-130980-7, Copy and additional material online at
http://mcwg.org/mcg-mirror/trustdef.htm,
http://nma.com/papers/it-trust-part1.pdf
16. Gerck, E.: Certification: Extrinsic, Intrinsic and Combined. Published online by
the MCG (1997), Copy online at, http://mcwg.org/mcg-mirror/cie.htm
17. Gerck, E.: Private, secure and auditable Internet voting. In: Secure Electronic
Voting, ch. 11, ibid
18. Gerck, E.: Voting Systems: from Art To Science. In: Caltech MIT Voting Technol-
ogy Conference, Pasadena, Calif. (2001), Copy online at
http://www.hss.caltech.edu/ ~ voting/gerck_present.ppt,
http://safevote.com/doc/gerck_present.ppt
19. Saltman, R.G.: Independent Verification: Essential Action to Assure Integrity in
the Voting Process. NIST Report, Order No. SB134106W0703 (2006)
20. Saltman, R.G.: Effective Use of Computing Technology in Vote-Tallying, Report
NBSIR 75-687 (republished as NBS Special Publication 500-30, 1978), National
Institute of Standards and Technology, Gaithersburg, MD (1975)
21. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
22. Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election
scheme. In: Proc. 26th IEEE Symposium on Foundations of Computer Science
(FOCS ’85), pp. 372–382. IEEE Computer Society, Los Alamitos (1985)
23. Benaloh, J.: Verifiable Secret-Ballot Elections. PhD thesis, Yale University, Dept.
of Computer Science (1987)
24. Mercuri, R.T.: Physical Verifiability of Computer Systems. In: Proc. of the 5th
International Computer Virus and Security Conference (March 1992)
25. Cramer, R., Franklin, M., Schoenmakers, B., Yung, M.: Multi-authority secret bal-
lot elections with linear work. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS,
vol. 1070, pp. 72–83. Springer, Heidelberg (1996)
26. Benaloh, Tuinstra: Receipt-free Secret-ballot Elections. In: STOC ’94, pp. 544–553
(1994)
27. Gerck, E.: Contra Costa County Shadow Election Report. Final Project Report
to the California Secretary of State (2000), Copy online at
http://safevote.com/doc/SafevoteContraCostaCountyElection.pdf,
http://safevote.com/onlineballot.htm
28. Neff, C.A.: A Verifiable Secret Shuffle and its Application to E-Voting. In: Pro-
ceedings ACM-CCS 2001, pp. 116–125 (2001)
29. Jakobsson, M., Juels, A., Rivest, R.L.: Making Mix Nets Robust for Electronic
Voting by Randomized Partial Checking. In: Proc. Usenix Security, pp. 339–353
(2002) IACR reprint 2002/025
30. Kiayias, A., Yung, M.: Robust Verifiable Non-Interactive Zero-Sharing: A Voting
Utility For Enhanced Privacy. In: Secure Electronic Voting, ch. 9, ibid
31. Mercuri, R.T., Neumann, P.G.: Verification of Electronic Balloting Systems. In:
Secure Electronic Voting, ch. 3, ibid

