{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:56:54Z","timestamp":1725584214300},"publisher-location":"Boston, MA","reference-count":34,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781461349815"},{"type":"electronic","value":"9781461502395"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-1-4615-0239-5_13","type":"book-chapter","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T03:42:05Z","timestamp":1307072525000},"page":"195-209","source":"Crossref","is-referenced-by-count":1,"title":["E-vote and PKI\u2019s: a Need, a Bliss or a Curse?"],"prefix":"10.1007","author":[{"given":"Danilo","family":"Bruschi","sequence":"first","affiliation":[]},{"given":"Giusi","family":"Poletti","sequence":"additional","affiliation":[]},{"given":"Emilia","family":"Rosti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"\u201cComputational Details of the VoteHere Homomorphic Election System\u201d","author":"J Adler","year":"2000","unstructured":"Adler, J., Dai, W., Green, R., Neff, A. \u201cComputational Details of the VoteHere Homomorphic Election System\u201d. November 2000;\n                    http:\/\/www.votehere.net\/\n                    \n                  vh-content-v2.0\/hom.pdf"},{"key":"13_CR2","volume-title":"\u201cZero Knowledge Protocols and Small Systems\u201d, Technical Report","author":"H Aronsson","year":"1995","unstructured":"Aronsson, H. \u201cZero Knowledge Protocols and Small Systems\u201d, Technical Report, 1995; \n                    http:\/\/saturn.tcs.hut.fi\/\n                    \n                  --helger\/crypto\/link\/zeroknowledge\/"},{"key":"13_CR3","volume-title":"\u201cA trusted process to digitally sign a document\u201d, In New Security Paradigms Workshop 2001, ACM Press","author":"B Balacheff","year":"2001","unstructured":"Balacheff, B., Chen, L., Plaquin, D., Proudler, G. \u201cA trusted process to digitally sign a document\u201d, In New Security Paradigms Workshop 2001, ACM Press, 2001."},{"key":"13_CR4","first-page":"544","volume-title":"Tuinstra, D. \u201cReceipt-Free Secret-Ballot Elections\u201d, In Proc. of the 26 th Annual ACM Symposium on the Theory of Computing, ACM Press","author":"J Benaloh","year":"1994","unstructured":"Benaloh, J., Tuinstra, D. \u201cReceipt-Free Secret-Ballot Elections\u201d, In Proc. of the 26\n                  \n                    111\n                  \n                  Annual ACM Symposium on the Theory of Computing, ACM Press, pp. 544\u2013553, 1994."},{"key":"13_CR5","volume-title":"A quantitative study of Public Key Infrastructures, Technical Report RI-DSI 268-01","author":"D Bruschi","year":"2001","unstructured":"Bruschi, D., Curti, A., Rosti, E. A quantitative study of Public Key Infrastructures, Technical Report RI-DSI 268\u201301, Dipt. di Scienze dell\u2019Informazione, Univ. degli Studi di Milano, 2001."},{"key":"13_CR6","volume-title":"\u201cInfecting digital signatures: The new threat\u201d","author":"D Bruschi","year":"2002","unstructured":"Bruschi, D., Rosti, E. \u201cInfecting digital signatures: The new threat\u201d. In preparation, 2002."},{"key":"13_CR7","volume-title":"\u201cReceipt-freeness in Large-Scale Elections without Untappable Channels\u201d","author":"M Burmester","year":"2001","unstructured":"Burmester, M., Chrissikopoulos, V., Magkos, E. \u201cReceipt-freeness in Large-Scale Elections without Untappable Channels\u201d, 2001; \n                    http:\/\/thalis.cs.unipi.gr\/\n                    \n                  ~emagos"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D Chaum","year":"1981","unstructured":"Chaum, D. \u201cUntraceable electronic mail, return address, and digital pseudonyms\u201d, In Com. of the ACM, 24: 84\u201388, 1981.","journal-title":"Com. of the ACM"},{"key":"13_CR9","first-page":"199","volume":"82","author":"D Chaum","year":"1982","unstructured":"Chaum, D. \u201cBlind signatures for untraceable payments\u201d, In Advances in Cryptology, CRYPTO\u2019 82, Springer-Verlag, pp. 199\u2013203, 1982.","journal-title":"Advances in Cryptology, CRYPTO\u2019"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D. \u201cSecurity without identification: transaction systems to make big brother obsolete\u201d, In Com. of the ACM, 28:1030\u20131044, 1985.","journal-title":"Com. of the ACM"},{"key":"13_CR11","first-page":"177","volume":"88","author":"D Chaum","year":"1989","unstructured":"Chaum, D. \u201cElections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA\u201d, In Advances in Cryptology, EUROCRYPT\u2019 88, pp.177\u2013182, 1989.","journal-title":"EUROCRYPT\u2019"},{"key":"13_CR12","volume-title":"\u201cImproving Privacy in Cryptographic Elections\u201d, Technical Report YALEU\/ DCS\/TR-454, Yale University","author":"J Cohen","year":"1986","unstructured":"Cohen, J. \u201cImproving Privacy in Cryptographic Elections\u201d, Technical Report YALEU\/ DCS\/TR-454, Yale University, February 1986."},{"key":"13_CR13","volume-title":"\u201cA Robust and Verifiable Cryptographically Secure Election Scheme\u201d, Technical Report YALEU\/DCS\/TR-416, Yale University","author":"J Cohen","year":"1985","unstructured":"Cohen, J., Fisher, M. \u201cA Robust and Verifiable Cryptographically Secure Election Scheme\u201d, Technical Report YALEU\/DCS\/TR-416, Yale University, 1985."},{"key":"13_CR14","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume":"97","author":"R Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B. \u201cA Secure and Optimally Efficient Multi-Authority Election Scheme\u201d. In Advances in Cryptology, EUROCRYPT \u2019 97, LNCS 1233, Springer-Verlag, pp. 103\u2013118, 1997.","journal-title":"Advances in Cryptology, EUROCRYPT \u2019"},{"key":"13_CR15","volume-title":"\u201cElectronic voting: computerized polls may save money, protect privacy\u201d, In ACM Crossroads (electronic Journal)","author":"L Cranor","year":"1996","unstructured":"Cranor, L. \u201cElectronic voting: computerized polls may save money, protect privacy\u201d, In ACM Crossroads (electronic Journal), 1996."},{"key":"13_CR16","volume-title":"\u201cInternet Privacy: A Public Concern\u201d","author":"L Cranor","year":"1998","unstructured":"Cranor, L. \u201cInternet Privacy:A Public Concern\u201d, 1998;\n                    http:\/\/www.acm.org\/\n                    \n                  pubs\/citations\/journals\/networker\/1998\u20132\u20133\/p13-cranor"},{"key":"13_CR17","volume-title":"\u201cSensus: A Security-Conscious Electronic Polling System for the Internet\u201d","author":"L Cranor","year":"1997","unstructured":"Cranor, L., Cytron, R. \u201cSensus: A Security-Conscious Electronic Polling System for the Internet\u201d. In Hawaii International Conference on System Sciences, Hawaii, 1997."},{"key":"13_CR18","volume-title":"\u201cMultiple Administrators for Electronic Voting\u201d. Bachelor\u2019s Thesis, MIT","author":"BW DuRette","year":"1999","unstructured":"DuRette, B. W. \u201cMultiple Administrators for Electronic Voting\u201d. Bachelor\u2019s Thesis, MIT, May 1999,\n                    http:\/\/theory.lcs.mit.edu\/\n                    \n                  ~cis\/cis-theses.html"},{"key":"13_CR19","first-page":"244","volume":"92","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K. \u201cA Practical Secret Voting Scheme for Large Scale Elections\u201d. In Advances in Cryptology, ASIACRYPT\u2019 92, LNCS 718, Springer-Verlag, pp. 244\u2013251, 1993.","journal-title":"Advances in Cryptology, ASIACRYPT\u2019"},{"key":"13_CR20","volume-title":"\u201cSecure Electronic Voting Using the World Wide Web\u201d. Master\u2019s Thesis, MIT","author":"M Herschberg","year":"1997","unstructured":"Herschberg, M. \u201cSecure Electronic Voting Using the World Wide Web\u201d. Master\u2019s Thesis, MIT, June 1997; \n                    http:\/\/theory.lcs.mit.edu\/\n                    \n                  ~cis\/theses\/herschberg-masters.pdf"},{"key":"13_CR21","volume-title":"\u201cPublic Key Infrastructure Certificate and CRL Profile\u201d, RFC2459","author":"R Housley","year":"1999","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D. \u201cPublic Key Infrastructure Certificate and CRL Profile\u201d, RFC2459, 1999."},{"key":"13_CR22","volume-title":"\u201cInternet X.509 Public Key Infrastructure\u201d, RFC2528","author":"R Housley","year":"1999","unstructured":"Housley, R., Polk, W. \u201cInternet X.509 Public Key Infrastructure\u201d, RFC2528, 1999."},{"key":"13_CR23","first-page":"248","volume":"93","author":"K Itoh","year":"1993","unstructured":"Itoh, K., Kurosawa, K., Park, C. \u201cEfficient Anonymous Channel and All\/Nothing Election Scheme\u201d,In Advances in Cryptology, EUROCRYPT\u2019 93 LNCS 765, Springer-Verlag, pp. 248\u2013259, 1993.","journal-title":"In Advances in Cryptology, EUROCRYPT\u2019"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Karro, J., Wang, J. \u201cTowards a Practical, Secure and Very Large Scale Online Election\u201d, In Proceedings 15th Annual Computer Security Applications Conference (ACSAC \u201889), ACM Press, 1999.","DOI":"10.1109\/CSAC.1999.816024"},{"key":"13_CR25","first-page":"393","volume":"95","author":"J Killian","year":"1995","unstructured":"Killian, J., Sako, K. \u201cReceipt-Free Mix-Type Voting Scheme; a practical solution to the implementation of a voting booth\u201d, In Proc. of EUROCRYPT\u2019 95, LNCS 921, Springer-Verlag, pp. 393\u2013403, 1995.","journal-title":"In Proc. of EUROCRYPT\u2019"},{"key":"13_CR26","volume-title":"\u201cConductiong a Universally Verifiable Electronic Election Using Homomorphic Encryption\u201d","author":"A Neff","year":"2000","unstructured":"Neff, A. \u201cConductiong a Universally Verifiable Electronic Election Using Homomorphic Encryption\u201d, November 2000; votehere.org\/whitepapers\/"},{"key":"13_CR27","volume-title":"\u201cA Verifiable Secret Shuffle and its Application to E-Voting\u201d","author":"A Neff","year":"2001","unstructured":"Neff, A. \u201cA Verifiable Secret Shuffle and its Application to E-Voting\u201d, August 2001; \n                    http:\/\/www.votehere.com"},{"issue":"10","key":"13_CR28","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/0167-4048(91)90081-N","volume":"36","author":"H Nurmi","year":"1991","unstructured":"Nurmi, H., Salomaa, A., Santean, L. \u201cSecret Ballot Elections in Computer Networks\u201d, Computers & Security 36, 10:553\u2013560, 1991.","journal-title":"Computers & Security"},{"key":"13_CR29","volume-title":"\u201cAn Untraceable, Universally Verifiable Voting Scheme\u201d, In Seminar in Cryptology","author":"M Radwin","year":"1995","unstructured":"Radwin, M. \u201cAn Untraceable, Universally Verifiable Voting Scheme\u201d, In Seminar in Cryptology, 1995."},{"key":"13_CR30","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/BFb0038196","volume":"555","author":"A Salomaa","year":"1991","unstructured":"Salomaa, A. \u201cVerifying and recasting secret ballots in computer networks\u201d, In New results and new trends in computer science, LNCS 555, Springer-Verlag, pp. 283\u2013289, 1991.","journal-title":"In New results and new trends in computer science, LNCS"},{"key":"13_CR31","first-page":"231","volume-title":"\u201cCompensating for lack of transparency\u201d, In Proc. of the 10th Conference on Computers, Freedom and Privacy,ACM Press","author":"B Schoenmakers","year":"2000","unstructured":"Schoenmakers, B. \u201cCompensating for lack of transparency\u201d, In Proc. of the 10th Conference on Computers, Freedom and Privacy, ACM Press, pp. 231\u2013233, April 2000."},{"key":"13_CR32","volume-title":"\u201cFully Auditable Electronic Secret-Ballot Elections\u201d","author":"B Schoenmakers","year":"2000","unstructured":"Schoenmakers, B. \u201cFully Auditable Electronic Secret-Ballot Elections\u201d, 2000;\n                    http:\/\/www.eucybervote.org\/publications.html"},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A. \u201cHow to share a secret\u201d, In Communication of the ACM, 22:612\u2013613, 1979.","journal-title":"Communication of the ACM"},{"key":"13_CR34","first-page":"156","volume-title":"\u201cMeasurement and analysis of LDAP performance\u201d, In ACM SIGMETRICS 2000, ACM Press","author":"X Wang","year":"2000","unstructured":"Wang, X., Schulzrinne, H., Kandlur, D., Verma, D. \u201cMeasurement and analysis of LDAP performance\u201d, In ACM SIGMETRICS 2000, ACM Press, pp. 156\u2013165, 2000."}],"container-title":["Advances in Information Security","Secure Electronic Voting"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4615-0239-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T05:05:01Z","timestamp":1553749501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4615-0239-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9781461349815","9781461502395"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-1-4615-0239-5_13","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2003]]}}}