[1] |
CHAUM D . Untraceable electronic mail,return addresses,and digital pseudonyms[J]. Communications of the ACM, 1981,24(2): 84-88.
|
[2] |
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router[A]. Proceedings of the 13th USENIX Security Symposium[C]. San Antonio, 2004. 03-320.
|
[3] |
FUJIOKA A , OKAMOTO T , OHTA K . A practical secret voting scheme for large scale elections[A]. Cryptology-Asiacrypt’92[C]. Queensland,Australia, 1992. 244-251.
|
[4] |
NEFF A . A verifiable secret shuffle and its application to e-voting[A]. Proceedings of ACM CCS ’01[C]. New York,USA, 2001. 116-125.
|
[5] |
GABBER E , BIBBONS P , MATIAS Y . How to make personalized Web browsing simple,secure,and anonymous[A]. Financial Cryptography ’97[C]. Anguilla, 1997. 17-31.
|
[6] |
JAKOBSSON M , RAIHI D . Mix-based electronic payments[A]. Proceedings of SAC ’98[C]. Kingston,Canada, 1998. 157-173.
|
[7] |
SEBE F , MIRET J , PUJOLIS J ,et al. Simple and efficient hash-based verifiable mixing for remote electronic voting[J]. Computer Communications, 2010,33(6): 667-675.
|
[8] |
WIKSTROM D . A sender verifiable Mix-net and a new proof of a shuffle[A]. Advances in Cryptology-Asiacrypt ’05[C]. Chennai (Madras),India, 2005. 273-292.
|
[9] |
GOLLE P , ZHONG S , BONEH D ,et al. Optimistic mixing for exit-polls[A]. Advances in Cryptology-Asiacrypt ’02[C]. Queenstown,New Zealand, 2002. 451-465.
|
[10] |
ABE M . Flaws in some robust optimistic Mix-nets[A]. Proceedings of Information Security and Privacy,8th Australasian Conference[C]. Wollongong,Australia, 2003. 39-50.
|
[11] |
WIKSTROM D . Five practical attacks for “optimistic mixing for exit-polls”[A]. Proceedings of Selected Areas of Cryptography (SAC)[C]. Ottawa,Canada, 2003. 160-174.
|
[12] |
LONGHAI L , SHAOFENG F , XIANGQUAN C . A new relation attack on the optimistic Mix-net[A]. International Symposium on Computer Network and Multimedia Technology(CNMT 2009)[C]. Wuhan, 2009. 1-4.
|
[13] |
FURUKAWA J . Efficient,verifiable shuffle decryption and its requirements of unlinkability[A]. Proceedings of PKC 2004[C]. Singapore, 2004. 319-332.
|
[14] |
CRAMER R , DAMGAARD I , SCHOENMAKERS B . Proofs of partial knowledge and simplified design of witness hiding protocols[A]. Cryptology–Crypto’94[C]. California,USA, 1994. 174-187.
|
[15] |
FIAT A , SHAMIR A . How to prove yourself:practical solutions to identification and signature problems[A]. Cryptology-Crypto’86[C]. California,USA, 1987. 186-194.
|
[16] |
PEDERSEN P . Non-interactive and information theoretic secure verifiable secret sharing[A]. Advances in Cryptology:Crypto'91[C]. California,USA, 1991. 129-140.
|
[17] |
FURUKAWA J , SAKO K . An efficient scheme for proving a shuffle[A]. Proceedings of Crypto’ 2001[C]. California,USA, 2001. 368-387.
|
[18] |
NEFF A . A verifiable secret shuffle and its application to e-voting[A]. Proceedings of ACM CCS ’01[C]. New York,USA, 2001. 116-125.
|
[19] |
GROTH J . A verifiable secret shuffle of homomorphic encryptions[J]. Journal of Cryptology, 2010,23(4): 546-579.
|
[20] |
FURUKAWA J , MIYAUCHI H , MORI K . An implementation of a universally verifiable electronic voting scheme based on shuffling[A]. Proceedings of Financial Cryptography'02[C]. Southampton,Bermuda, 2002. 16-30.
|
[21] |
OHKUBO M , ABE M . A length-invariant hybrid mix[A]. Cryptology-Asiacrypt’00[C]. Kyoto,Japan, 2000. 178-191.
|
[22] |
OGATA W , KUROSAWA K , SAKO K ,et al. Fault tolerant anonymous channel[A]. Proceedings of.ICICS '97[C]. South Africa, 1997. 440-444.
|
[23] |
ABE M . Mix-networks on permutation networks[A]. CryptologyAsiacrypt’99[C]. Singapore, 1999. 258-273.
|