A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
A hard-core predicate for all one-way functions
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Fair e-Lotteries and e-Casinos
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Playing Lottery on the Internet
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Publicly Verifiable Lotteries: Applications of Delaying Functions
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Sharing Decryption in the Context of Voting or Lotteries
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Efficient Construction of (Distributed) Verifiable Random Functions
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
How To Construct Randolli Functions
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A verifiable random function with short proofs and keys
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Design of electronic t-out-of-n lotteries on the Internet
Computer Standards & Interfaces
Token-controlled public key encryption in the standard model
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.24 |
A number of electronic lottery (e-lottery) schemes have been proposed; however, none of them can satisfy all the identified requirements. In particular, some of them require either a certain subset of players or a trusted third party (TTP) to remain online in order to generate the winning number(s), and some suffer from the forgery ticket attack. Based on various advanced cryptographic techniques, we propose a new e-lottery scheme that can satisfy all the identified requirements without the presence of TTP for generating the winning numbers, yet the result of this generation is publicly verifiable.