[1] Chevallier-Mames B, Fouque P A, Stern D P J, et al. On Some Incompatible Properties of Voting Schemes[C]//Proc. of Towards Trustworthy Elections: New Directions in Electronic Voting Conference. [S. 1.]: Springer, 2010. [2] Fink R A, Sherman A T, Carback R. TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(4): 628-637. [3] Gallo R, Kawakami H, Dahab R, et al. T-DRE: A Hardware Trusted Computing Base for Direct Recording Electronic Vote Machines[C]//Proc. of the 26th Annual Computer Security Applications Conference. [S. 1.]: ACM Press, 2010. [4] 沈昌祥, 张焕国, 王怀民, 等. 可信计算的研究与发展[J]. 中国科学: 信息科学, 2010, 40(2): 139-166. [5] Alkassar A, Sadeghi A R, Schulz S, et al. Towards Trustworthy Online Voting[C]//Proc. of the 1st Benelux Workshop on Information and System Security. [S. 1.]: IEEE Press, 2006. [6] Paul N, Tanenbaum A S. Trustworthy Voting: From Machine to System[J]. IEEE Computer, 2009, 42(5): 23-29. [7] Smart M, Ritter E. True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing[R]. Birmingham, UK: University of Birmingham, Tech. Rep.: CSR-10-12, 2010. [8] Trusted Computing Group. TPM Main Specification[EB/OL]. (2007-10-20). http://www.trustedcomputinggroup.org/resources/tp m_main_specification. [9] 毛军捷. 可信平台控制模块若干关键技术研究[D]. 北京: 北京工业大学, 2011. [10] Clarkson M R, Chong S, Myers A C. Civitas: Toward a Secure Voting System[C]//Proc. of the 29th IEEE Symposium on Security and Privacy. [S. 1.]: IEEE Press, 2008. [11] Dingledine R, Mathewson N, Syverson P. Tor: The Second- generation Onion Router[C]//Proc. of the 13th USENIX Security Symposium. [S. 1.]: USENIX Association, 2004. [12] Okamoto T. Receipt-free Electronic Voting Schemes for Large Scale Elections[C]//Proc. of the 5th International Workshop on Security Protocols. [S. 1.]: Springer, 1998. [13] Hirt M, Sako K. Efficient Receipt-free Voting Based on Homomorphic Encryption[C]//Proc. of the 19th International Conference on the Theory and Application of Cryptographic Techniques. [S. 1.]: Springer, 2000. [14] 李彦江, 马传贵, 黄刘生. 一种电子投票方案[J]. 软件学报, 2005, 16(10): 1805-1810. [15] Groth D J, Salomonsen G. Secure Electronic Voting[M]. [S. 1.]: Kluwer Academic Publishers, 2003. [16] Tuinstra B D. Receipt-free Secret-ballot Elections[C]//Proc. of the 26th ACM Symposium on Theory of Computing. [S. 1.]: ACM Press, 1994. [17] Lee B, Kim K. Receipt-free Electronic Voting Scheme with a Tamper-resistant Randomizer[C]//Proc. of the 5th International Conference on Information Security and Cryptology. [S. 1.]: Springer, 2003. [18] 韩 玮. 电子选举中的安全技术研究[D]. 上海: 上海交通大学, 2008. [19] Juels A, Catalano D, Jakobsson M. Coercion-resistant Electronic Elections[C]//Proc. of the 2005 ACM Workshop on Privacy in the Electronic Society. [S. 1.]: ACM Press, 2005. [20] 邱卫东. 密码协议基础[M]. 北京: 高等教育出版社, 2009. [21] Sailer R, Zhang X, Jaeger T, et al. Design and Implementation of a TCG-based Integrity Measurement Architecture[C]//Proc. of the 13th USENIX Security Symposium. [S. 1.]: USENIX Association, 2004. [22] Stadler C M. Efficient Group Signature Schemes for Large Groups[C]//Proc. of the 17th International Cryptology Conference. [S. 1.]: Springer, 1997.
|