[1] CHAUM D L. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2):84-90. [2] FUJIOKA A, OKAMOTO T, OHTA K. A practical secret voting scheme for large scale elections[C]//AUSCRYPT 1992:Proceedings of the 1992 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 718. Berlin:Springer, 1993:244-251. [3] ANTONIOU A, KORAKAS C, MANOLOPOULOS C, et al. A trust-centered approach for building e-voting systems[C]//EGOV 2007:Proceedings of the 2007 International Conference on Electronic Government. Berlin:Springer, 2007:366-377. [4] TAGHAVI T, KAHANI M, BAFGHI A G. A verifiable multi-authority e-voting scheme for real world environment[M]//ELLEITHY K. Advances and Innovations in Systems, Computing Sciences and Software Engineering. Berlin:Springer, 2007:421-426. [5] PENG K, BAO F. Efficient multiplicative homomorphic e-voting[C]//ISC 2010:Proceedings of the 2010 International Conference on Information Security. Berlin:Springer, 2010:381-393. [6] 曹刚, 施荣华. 一种Internet上的匿名电子投票协议的研究与设计[J]. 计算机工程与应用, 2004, 40(12):156-157.(CAO G, SHI R H. The research and design of an anonymous vote protocol of Internet[J]. Journal of Computer Engineering and Applications, 2004, 40(12):156-157.) [7] 罗芬芬, 林昌露, 张胜元, 等. 基于FOO投票协议的无收据电子投票方案[J]. 计算机科学, 2015, 42(8):180-184.(LUO F F, LIN C L, ZHANG S Y, et al. Electronic voting protocol with receipt-freeness based on the FOO voting protocol[J]. Computer Science, 2015, 42(8):180-184.) [8] 杨婷婷, 林昌露, 刘忆宁, 等. 基于多方排序协议的安全电子投票方案[J]. 计算机系统应用, 2015, 24(8):25-32.(YANG T T, LIN C L, LIU Y N, et al. Secure electronic voting scheme based on multi-party ranking[J]. Computer Systems and Applications, 2015, 24(8):25-32.) [9] 刘高, 刘忆宁, 王东. 一种可验证的多候选人电子投票方案[J]. 计算机工程与科学, 2015, 37(9):1667-1670.(LIU G, LIU Y N, WANG D. A verifiable e-voting scheme with multi-candidates[J]. Computer Engineering and Science, 2015, 37(9):1667-1670.) [10] 徐紫枫, 曾康, 周福才. 基于时间释放加密和数字签名的匿名电子投票方案[J]. 计算机应用与软件, 2016, 33(12):325-328.(XU Z F, ZENG K, ZHOU F C. Anonymous electronic voting scheme based on time-released encryption and digital signature[J]. Computer Applications and Software, 2016, 33(12):325-328) [11] 董宇琦, 翟健宏, 孙彤, 等. 基于隐私保护的电子选举投票系统[J]. 计算机应用, 2016, 36(增刊2):73-76.(DONG Y Q, ZHAI J H, SUN T, et al. Electronic voting system based on privacy protection[J]. Journal of Computer Applications, 2016, 36(S2):73-76.) [12] 黄仕杰, 洪璇. 基于同态实现多候选人的电子投票方案[J]. 计算机应用与软件, 2017, 34(3):284-288.(HUANG S J, HONG X. An electronic voting scheme realizing multi candidates based on homomorphism[J]. Computer Applications and Software, 2017, 34(3):284-288.) [13] DESMEDT Y. Threshold cryptosystems[C]//AUSCRYPT 1992:Proceedings of the 1992 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 718. Berlin:Springer, 1993:1-14. [14] ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4):469-472. [15] RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[C]//ASIACRYPT 2001:Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin:Springer, 2001:552-565. [16] IFTENE S. General secret sharing based on the Chinese remainder theorem with applications in e-voting[J]. Electronic Notes in Theoretical Computer Science, 2007, 186:67-84. [17] LI H, SUI Y, PENG W, et al. A viewable e-voting scheme for environments with conflict of interest[C]//CNS 2013:Proceedings of the 2013 International Conference on Communications and Network Security. Piscataway, NJ:IEEE, 2013:251-259. [18] YUAN L, LI M, GUO C, et al. A verifiable e-voting scheme with secret sharing[C]//ICCT 2015:Proceedings of the 2015 International Conference on Communication Technology. Ghaziabad:IEEE, 2015:304-308. |