{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T16:55:09Z","timestamp":1763225709266},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_37","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T16:50:39Z","timestamp":1186678239000},"page":"411-424","source":"Crossref","is-referenced-by-count":72,"title":["Secure Voting Using Partially Compatible Homomorphisms"],"prefix":"10.1007","author":[{"given":"Kazue","family":"Sako","sequence":"first","affiliation":[]},{"given":"Joe","family":"Kilian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","first-page":"544","volume":"94","author":"J. C. Benaloh","year":"1994","unstructured":"Benaloh, J. C., Tuinstra, D.: Receipt-free secret-ballot elections. In STOC 94 (1994) pp. 544\u2013553","journal-title":"STOC"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Yung, M.: Distributing the power of a government to enhance the privacy of voters. In ACM Symposium on Principles of Distributed Computing (1986) pp. 52\u201362","DOI":"10.1145\/10590.10595"},{"key":"37_CR3","unstructured":"Benaloh, J.: Verifiable secret-ballot Elections. PhD thesis Yale University 1987. YALEU\/DCS\/TR-561"},{"key":"37_CR4","first-page":"69","volume":"91","author":"J. Boyar","year":"1991","unstructured":"Boyar, J., Brassard, G., Peralta, R.: Subquadratic zero-knowledge. In FOCS 91 (1991) pp. 69\u201378","journal-title":"FOCS"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM. ACM 1981 pp. 84\u201388","DOI":"10.1145\/358549.358563"},{"key":"37_CR6","first-page":"372","volume":"85","author":"J. Cohen","year":"1985","unstructured":"Cohen, J., Fischer, M. J.: A robust and verifiable cryptographically secure election scheme. In FOCS 85 (1985) pp. 372\u2013382.","journal-title":"FOCS"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology \u2014Crypto\u2019 86. Springer-Verlag 1986 pp. 186\u2013199","DOI":"10.1007\/3-540-47721-7_12"},{"key":"37_CR8","first-page":"699","volume":"92","author":"M. Franklin","year":"1992","unstructured":"Franklin, M., Yung, M.: Communication complexity of secure computation. In STOC 92 (1992) pp. 699\u2013710","journal-title":"STOC"},{"key":"37_CR9","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In Advances in Cryptology \u2014Auscrypt\u2019 92 (1992) pp. 244\u2013251"},{"key":"37_CR10","first-page":"722","volume":"92","author":"J. Kilian","year":"1992","unstructured":"Kilian, J.: A note on efficient zero-knowledge proofs and arguments. In STOC 92 (1992) pp. 722\u2013732","journal-title":"STOC"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Tsujii, S.: Multi-language zero knowledge interactive proof systems. In Advances in Cryptology \u2014Crypto\u2019 90 (1991) pp. 339\u2013352","DOI":"10.1007\/3-540-38424-3_25"},{"key":"37_CR12","unstructured":"Park, C., Itoh, K., Kurosawa, K.: All\/Nothing election scheme and anonymous channel. In Advances in Cryptology \u2014EUROCRYPT\u2019 93 (1993) pp. 248\u2013259"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:16:17Z","timestamp":1605629777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_37","relation":{},"subject":[]}}