Author of the publication

An Improvement on a Practical Secret Voting Scheme.

, , , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 225-234. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Hierarchical Identity-Based Identification without Random Oracles., , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)A Practical Secret Voting Scheme for Large Scale Elections, , and . ASIACRYPT '92, 718, page 244--251. Springer, (1993)Security Enhancements by OR-Proof in Identity-Based Identification., , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 135-152. Springer, (2012)Interactive Bi-Proof Systems and Undeniable Signature Schemes., , and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 243-256. Springer, (1991)Single Private-Key Generator Security Implies Multiple Private-Key Generators Security., and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 56-74. Springer, (2018)Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 15-30. Springer, (2010)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1306-1317 (2011)Non-malleable Multiple Public-Key Encryption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1318-1334 (2014)A Practical Secret Voting Scheme for Large Scale Elections., , and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 244-251. Springer, (1992)An Improvement on a Practical Secret Voting Scheme., , , , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 225-234. Springer, (1999)