{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:46:47Z","timestamp":1743140807737,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375586"},{"type":"electronic","value":"9780306469589"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-46958-8_3","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T09:49:39Z","timestamp":1140428979000},"page":"33-43","source":"Crossref","is-referenced-by-count":0,"title":["Software-based Receipt-freeness in On-line Elections"],"prefix":"10.1007","author":[{"given":"Emmanouil","family":"Magkos","sequence":"first","affiliation":[]},{"given":"Vassilios","family":"Chrissikopoulos","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Alexandris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"D. Alpert, D. Ellard, O. Kavazovic, M. Scheff. Receipt-Free Secure Elections 6.857 Final Project, 6.857 Network and Computer Security, 1998, http:\/\/www.eecs.harvard.edu\/~ellard\/6.857\/final.ps ."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"J. Benaloh, D. Tuinstra. Receipt-free secret-ballot elections, 26th Annual ACM Symposium on the Theory of Computing, Proceedings, 1994, pp. 544\u2013553.","DOI":"10.1145\/195058.195407"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0052229","volume":"1294","author":"R. Canetti","year":"1997","unstructured":"R. Canetti, C. Dwork, M. Naor, R. Ostrovsky. Deniable Encryption, Advances in Cryptology-CRYPTO 97, Proceedings, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag 1997, pp. 90\u2013104.","journal-title":"Lecture Notes in Computer Science"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"D. Chaum. Blind Signatures for Untraceable Payments, Advances in Cryptology-CRYPTO 82, Proceedings, Plenum Press 1982, pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"3_CR5","unstructured":"L. Cottrell. Mixmaster and Remailer Attacks, http:\/\/obscura.obscura.com\/~loki\/remailer\/remailer-essay.html ."},{"key":"3_CR6","unstructured":"L. Cranor, R. Cytron. Sensus: A security-conscious electronic polling system for the Internet, Hawaii International Conference on System Sciences, Proceedings, 1997, http:\/\/www.research.att.com\/~lorrie\/pubs\/hicss\/hicss.html ."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"M. Franklin, M. Reiter. Fair exchange with a semi-trusted third party, 4th ACM Conference on Computer and Communications Security, Proceedings, ACM 1997, pp. 1\u20136.","DOI":"10.1145\/266420.266424"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"D. Goldschlag, M. Reed, P. Syverson. Onion Routing for Anonymous and Private Communications, Communications of the ACM, Vol. 42(2), pp. ACM 1999, pp. 39\u201341.","journal-title":"Communications of the ACM"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume":"1807","author":"M. Hirt","year":"2000","unstructured":"M. Hirt, K. Sako. Eficient Receipt-fie Voting Based on Homomorphic Encyption, Advances in Cryptology-EUROCRYPT 2000, Proceedings, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag 2000, pp 539\u2013556.","journal-title":"Lecture Notes in Computer Science"},{"key":"3_CR10","unstructured":"B. Lee, K. Kim. Receipt-free Electronic Voting through Collaboration of Voter and Honest Verifier, JWISC 2000, Proceedings, 2000, pp. 101\u2013108."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Y. Mu, V. Varadharajan. Anonymous Secure e-voting over a network, 14th Annual Computer Security Application Conference, Proceedings, IEEE Computer Society 1998, pp. 293\u2013299.","DOI":"10.1109\/CSAC.1998.738649"},{"key":"3_CR12","first-page":"141","volume":"917","author":"V. Niemi","year":"1994","unstructured":"V. Niemi, A. Renvall. How to prevent Buying of Votes in Computer Elections, Advances in Cryptology-ASIACRYPT 94, Proceedings, Lecture Notes in Computer Science, Vol. 917, Springer-Verlag 1994, pp. 141\u2013148.","journal-title":"Lecture Notes in Computer Science"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"T. Okamoto. An Electronic Voting Scheme, IFIP\u2019 96, Proceedings, Advanced IT Tools, Chapman & Hall 1996, pp. 21\u201330.","DOI":"10.1007\/978-0-387-34979-4_3"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0034841","volume":"1163","author":"T. Okamoto","year":"1996","unstructured":"T. Okamoto. Receipt-Free Electronic Voting schemes for Large Scale Elections, Workshop of Security Protocols\u2019 97, Proceedings, Lecture Notes in Computer Science, Vol. 1163, Springer-Verlag 1996, pp. 125\u2013132.","journal-title":"Lecture Notes in Computer Science"},{"key":"3_CR15","unstructured":"A. Riera, J. Borrell, J. Rifa. An uncoercibleverifiable electronic voting protocol, 14th International Information Security Conference IFIP\/SEC\u201998, Proceedings, 1998, pp. 206\u2013215."},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Vol. 21, ACM 1978, pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"3_CR17","unstructured":"R. Rivest, A. Shamir, D. Wagner. Time-Lock Puzzles and Timed-Released Crypto, LCS Technical Memo MIT\/LCS\/TR-684, 1996, http:\/\/www.theory.Ics.rnit.edu\/~rivest\/RivestShamirWagner-timelock.ps"},{"issue":"1","key":"3_CR18","first-page":"24","volume":"E77-A","author":"K. Sako","year":"1994","unstructured":"K. Sako. Electronic Voting Scheme Allowing Open Objection to the Tally, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Proceedings, Vol. E77-A(1), 1994, pp. 24\u201330.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Proceedings"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-49264-X_32","volume":"921","author":"K. Sako","year":"1995","unstructured":"K. Sako, J. Killian. Receipt-Free Mix-Type Voting Schemes-A practical solution to the implementation of voting booth, Advances in Cryptology-EUROCRYPT 95, Lecture Notes in Computer Science, Vol. 921, Springer-Verlag 1995, pp. 393\u2013403.","journal-title":"Lecture Notes in Computer Science"},{"key":"3_CR20","unstructured":"B. Schneier. Applied Cryptography-Protocols, Algorithms and Source Code in C, 2nd Edition, 1996."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Network and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-46958-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T20:27:40Z","timestamp":1736281660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-46958-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375586","9780306469589"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/0-306-46958-8_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}