55 (1) (2) (3) (4) Hwang[36] Hwang
56 1. 1.1.
57 1.2. 2. 2.1. 2.1.1.
58
59 2.1.2.
60 3. 3.1.
61
62 1 3.1.1.
63 2
64 3.1.2.
65 1
66 3.1.3. 3
67 DES 4
68
69 text text 5
70 4. 4.1. 6
71 4.1.1. 4.1.2.
72 7 4.1.3. 4.2.
73 4.3. Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 L1 17 3 20 4 45 33 15 33 10 29 L2 24 13 10 17 5 10 27 13 19 17 L3 7 14 8 14 6 12 13 9 16 9 L4 6 22 8 18 0 0 1 0 9 0 L5 2 4 10 3 0 1 0 1 2 1 56 56 56 56 56 56 56 56 56 56 2 Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 L1 18 1 19 2 44 32 14 29 9 29 L2 25 12 8 13 5 12 26 15 19 19 L3 4 13 8 18 6 12 15 12 15 7 L4 7 25 10 19 1 0 1 0 11 0 L5 2 5 11 4 0 0 0 0 2 1 56 56 56 56 56 56 56 56 56 56 3????????????????????????????????????????????
74 Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 0.192 0.633 0.518 1.591 0.088 1.738 0.187 0.583 0.252 0.333 2 2 4 2 2 2 2 2 3 2 5.99 5.99 9.49 5.99 5.99 5.99 5.99 5.99 7.81 5.99 4 5. 5.1.
75 5.2.
76 [1] 1993 [2] 1994 25-37 [3] ANSI X9.17 (Revised), American National Standard for Financial Institution Key Management (Wholesale), American Bankers Association, 1985. [4] J. Benaloh and M. Yung, Distributing the Power of the Government to Enhance the Privacy of Votes, Proceedings of the 5th ACM Symposium on Principles of Distributed Computing, Aug. 1986, 52-62. [5] J. Benaloh, Verifiable Secret-Ballot Elections, Ph.D. Dissertation, Yale University, USA, Sept. 1987, YALEU/DCS/TR-561. [6] J. Benaloh and Dwight Tuinstra, Receipt-Free Secret-Ballot Elections, Proceedings of the 24th Symposium on Theory of Computing (STOC 94), 1994, 544-553. [7] J. Borrell and J. Rifa, An Implementable Secure Voting Scheme, Computers & Security, 15 (4), 1966, 327-338. [8] C. Boyd, A New Multiple Key Cipher and an Improved Voting Scheme, in Advances in Cryptology - Eurocrypt 89, 1989, 617-625. [9] D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, 24 (2), Feb. 1981, 84-88. [10] D. Chaum, Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA, in Advances in Cryptology - Eurocrypt 88, 1988, 177-182.
77 [11] Chin-Chen Chang and Wen-Bin Wu, A Secure Voting System on a Public Network, Master s Thesis, Inst. Comput. Science and Infor. Eng., Nat. Chyng-Cheng Univ., Taiwan, ROC, 1994. [12] J. D. Cohen and M. H. Fisher, A Robust and Verifiable Cryptographically Secure Election Scheme, Proceedings of the 26th Annual IEEE Symposium on the Foundations of Computer Science, 1885, 372-382. [13] J. D. Cohen, Improving Privacy in Cryptographic Elections, TR-471, Yale Univeersity, Department of Computer Science, New Haven CT, Apr. 1986. [14] R. Cramer, R. Gennaro, B. Schoenmakers, and M. Yung, Multi-Authority Secret-Ballot Elections with Linear Work, in Advances in Cryptology - Eurocrypt 96, 1996, 72-83. [15] R. Cramer, R. Gennaro, and B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, in Advances in Crypto logy - Eurocrypt 97, 1997, 103-118. [16] L. F. Cranor and R. K. Cytron, Design and Implementation of a Security-Conscious Electronic Polling System, Washington University Computer Science Technical Report WUCS-96-02, 1996. [17] L. F. Cranor, Electronic Voting Computerized Polls May Save Money, Protect Privacy, Crossroads, April, 1996. [18] B. Davenport, A. Newberger, and J. Woodard, Creating a Secure Digital Voting Protocol for Campus Elections, (http://www.princeton.edu/~bpd/voting/),1995. [19] A. Fiate and A. Shamir, How to Prove Yourself: Practical Solutions to Identification and Signature Problems, in Advances in Cryptology - Crypto 86, 1986, 186-199. [20] A. Fujioka, T. Okamoto and K. Ohta, A Practical Secret Voting Scheme for Large ScaleElections, in Advances in Cryptology - Auscrypt 92, 1992, 244-251. [21] Jing-Jang Hwang, A Conventional Approach to Secret Balloting in Computer Networks, Computers & Security, 15 (3), 1996, 249-263. [22] Jing-Jang Hwang, Chyan Yang, Min-Hui Lin, Jong Liang Neih, and Kou Chen Wu, Extension & Discussion of an Anonymous Voting System, Proceedings of National Information Security Conference, Republic of China, 1996, 161-170. [23] K. R. Iversen, A Cryptographic Scheme for Computerized General Elections, in Advances in Cryptology - Crypto 91, 1992, 405-419.
78 [24] Jinn-Ke Jan and Chih-Chang Tai, A Secure Electronic Voting Protocol with IC Cards, Journal of Systems and Software, 39 (2), 1997, 93-101. [25] Wen-Shenq Juang and Chin-Laung Lei, A Collision-Free Secret Ballot Protocol for Computerized General Elections, Computers & Security, 15 (4),1996, 339-348. [26] Min-Hui Lin, Jong Liang Neih, Jing-Jang Hwang, Chyan Yang, Developing a System for Secret Balloting over the Internet with an Emphasis on the System s Merits for Social Acceptance, International Conference on Computer System Technology for Industrial Application Internet and Multimedia Proceeding (CSIA 97),1997, pp.226-233. [27] Jong Liang Neih, An Anonymous Voting System Applied to Group Decisions, Master Thesis, National Chiao Tung University, 1996. [28] H. Nurmi, A. Salomaa and L. Santean, Secret Ballot Elections in Computer Networks, Computers & Security, 10,1991, 553-560. [29] Park, K. Itoh and Kaoru Kurosawa, Efficient Anonymous Channel and All/Nothing ElectionScheme, in Advances in Cryptology - Eurocrypt 89, 1993, 248-259. [30] Shun-Fu Pon, To Chang, Erl-Huei Lu, and Jau-Yien Lee, An Anonymous Electronic Voting Protocol, Proceedings of National Information Security Conference, Republic of China, 1996, 171-177. [31] Kazue Sako, Electronic Voting Scheme Allowing Open Objection to the Tally, IEICE Trans. Fundamentals, E77-A (1), Jan. 1994, 24-30. [32] Kazue Sako, Joe Kilian, Secure Voting Using Partially Compatible Homomorphism, in Advances in Cryptology - Crypto 94, 1994, pp.411-424. [33] Kazue Sako, Joe Kilian, Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation, in Advances in Cryptology - Eurocrypt 95, 1995, 393-403. [34] P. H. Slessenger, Socially Secure Cryptographic Election Scheme, Electronic Letters, 27 (11),May 1991, 955-957.