A secure and optimally efficient multi‐authority election scheme
- 12 September 1997
- journal article
- focus
- Published by Wiley in European Transactions on Telecommunications
- Vol. 8 (5) , 481-490
- https://doi.org/10.1002/ett.4460080506
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Wallet Databases with ObserversPublished by Springer Nature ,2001
- Proactive RSAPublished by Springer Nature ,1997
- Deniable EncryptionPublished by Springer Nature ,1997
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- Efficient signature generation by smart cardsJournal of Cryptology, 1991
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Transaction protection by beaconsJournal of Computer and System Sciences, 1983
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981
- How to share a secretCommunications of the ACM, 1979
- New directions in cryptographyIEEE Transactions on Information Theory, 1976