HOME JOURNALS CONTACT

Information Technology Journal

Year: 2009 | Volume: 8 | Issue: 7 | Page No.: 934-964
DOI: 10.3923/itj.2009.934.964
A Critical Review of Receipt-Freeness and Coercion-Resistance
Bo Meng

Abstract: In this study, we first briefly introduce the development status of core cryptographic primitives related to implementation of receipt-freeness and coercion-resistance. These core cryptographic primitives consist of blind signature, deniable encryption, mix net/verifiable shuffles, designated verifier proof/signature, knowledge proof protocol, plaintext equivalence test, secure multi-party computation and deniable authentication protocol. Then, a typical deniable encryption scheme is analyzed and improved. Moreover, the state-of-art of receipt-freeness and coercion-resistance, based on the internet voting model proposed by us, is presented. Finally, the status in quo of formal analysis of receipt-freeness and coercion-resistance is discussed.

Fulltext PDF Fulltext HTML

How to cite this article
Bo Meng , 2009. A Critical Review of Receipt-Freeness and Coercion-Resistance. Information Technology Journal, 8: 934-964.

Related Articles:
© Science Alert. All Rights Reserved