참고문헌
- D.Chaum, 'Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms', Comm. of the ACM, vol. 24, no. 2, pp.84-88, Feb. 1981 https://doi.org/10.1145/358549.358563
- S.Goldwasser and S.Micali, 'Probabilistic Encryption', Journal of Computer System Sciences(JCSS), vol. 28, no. 2, pp.270-299, Apr. 1984 https://doi.org/10.1016/0022-0000(84)90070-9
- T.ElGamal, 'A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms', IEEE Trans. on Information Theory, vol. IT-31, no. 4, pp.469-472, 1985
- M.Naor and A.Shamir, 'Visual Cryptography', Proc. of Advances in Cryptology (Eurocrypt'94), LNCS 950, pp.1-12, 1995
- P.Paillier, 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes', Proc. of Advances in Cryptology(Eurocryp'99), LNCS 1592, pp.223-238, 1999
- R.Mercuri, 'Rebecca Mercuri's Statement on Electronic Voting,' http://www.notablesoftware.com/RMstatement.html, 2001
- C.A.Neff, 'A Verifiable Secret Shuffle and Its Application to E-Voting', Proc. of the 8th ACM Conference on Computers and Communications Security(CCS-8), pp.116-125, 2001
- R.Mercuri, 'A Better Ballot Box?', IEEE Spectrum Online, pp.46-50, Oct. 2002
- C.A.Neff and J.Adler, 'Verifiable e-Voting: Indisputable Electronic Elections at Polling Places', http://www.votehere.net/vhti/documentation/VH\_VHTi\_WhitePaper.pdf, VoteHere Inc., 2003
- D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical, Voter-Verifiable Election Scheme', Technical Report CS-TR-880, University of Newcastle upon Tyne, 2004
- P.Golle, M.Jakobsson, A.Juels, and P.Syverson, 'Universal Re-encryption for Mixnets', CT-RSA 2004, LNCS 2964, pp.163-178, 2004
- D.Chaum, 'Secret-Ballot Receipts: True Voter-Verifiable Elections', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.38-47, Jan. 2004 https://doi.org/10.1109/MSP.2004.57
- D.Evans and N.paul, 'Election Security: Perception and Reality', IEEE Security and Privacy Magazine, vol. 2, no. 1, pp.24-31, Jan. 2004 https://doi.org/10.1109/MSECP.2004.1264850
- D.Chaum, P.Y.A.Ryan, and S.Schneider, 'A Practical Voter-Verifiable Election Scheme', Proc. of 10th European Symposium on Research in Computer Security(ESORICS2005), LNCS 3679, pp.118-139, 2005
- '전자선거추진협의회 공식 출범', http://www.nec.go.kr/notice/report/, 중앙선거관리위원회, 2005
- Y.Tsiounis and M.Yung, 'On the Security of ElGamal Based Encryption', Public Key Cryptography 98(PKC'98), LNCS 1431, pp.117-134, 1998
- R.Cramer and V.Shoup, 'A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack', Crypto'98, LNCS 1462, pp.13-25, 1998
- C.Karlof, N.Sastry and D.Wagner, 'Cryptographic Voting Protocol : A Systems Perspective', Proc. of 14th USENIX Security Symposium(USENIX2005), pp.33-50, 2005
- D.Boneh and P.Golle, 'Almost Entirely Correct Mixing with Applications to Voting', Proc. of 9th ACM conference on Computer and Communications Security(CCS), 2002