{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:42:15Z","timestamp":1772642535997,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030242954","type":"print"},{"value":"9783030242961","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24296-1_40","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:06:36Z","timestamp":1561755996000},"page":"509-521","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Implementation of an E-Voting Scheme Using Hyperledger Fabric Permissioned Blockchain"],"prefix":"10.1007","author":[{"given":"Denis","family":"Kirillov","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Korkhov","sequence":"additional","affiliation":[]},{"given":"Vadim","family":"Petrunin","sequence":"additional","affiliation":[]},{"given":"Mikhail","family":"Makarov","sequence":"additional","affiliation":[]},{"given":"Ildar M.","family":"Khamitov","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Dostov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"40_CR1","unstructured":"Madise, U., Martens, T.: E-voting in Estonia 2005. The first practice of country-wide binding internet voting in the world. In: Krimmer, R. (ed.): Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, August, 2nd - 4th, 2006 in Castle Hofen, Bregenz, Austria. LNI., GI, vol. 86, pp. 15\u201326 (2006)"},{"key":"40_CR2","unstructured":"Brightwell, I., Cucurull, J., Galindo, D., Guasch, S.: An overview of the ivote 2015 voting system (2015)"},{"key":"40_CR3","unstructured":"Springall, D., et al.: Security analysis of the estonian internet voting system. In: Ahn, G., Yung, M., Li, N. (eds.) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3\u20137, 2014, pp. 703\u2013715. ACM (2014)"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-22270-7_3","volume-title":"E-Voting and Identity","author":"JA Halderman","year":"2015","unstructured":"Halderman, J.A., Teague, V.: The new south wales ivote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R.E., Wikstr\u00f6m, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 35\u201353. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-22270-7_3"},{"key":"40_CR5","volume-title":"Applied Cryptography - Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography - Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"40_CR6","unstructured":"Sheer, H., Freya, G., Apostolos, A., Raja, N., Markantonakis, K.: E-Voting with blockchain: an E-voting protocol with decentralisation and voter privacy (2018)"},{"key":"40_CR7","doi-asserted-by":"publisher","unstructured":"Hj\u00e1lmarsson, F., Hrei\n                      \n                        \n                      \n                      $$\\eth $$\n                      \n                        \n                          \u00f0\n                        \n                      \n                    arsson, G., Hamdaqa, M., Hj\u00e1lmt\u00fdsson, G.: Blockchain-based e-voting system. In: 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, 2018, pp. 983\u2013986. IEEE (2018). \n                      https:\/\/doi.org\/10.1109\/CLOUD.2018.00151","DOI":"10.1109\/CLOUD.2018.00151"},{"key":"40_CR8","doi-asserted-by":"publisher","unstructured":"Ko\u00e7, A.K., Yavuz, E., \u00c7abuk, U.C., Dalk\u0131l\u0131\u00e7, G.: Towards Secure e-voting using ethereum blockchain. In: 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, 22\u201325 March 2018. \n                      https:\/\/doi.org\/10.1109\/ISDFS.2018.8355340","DOI":"10.1109\/ISDFS.2018.8355340"},{"key":"40_CR9","unstructured":"Liu, Y., Wang, Q.: An E-voting Protocol Based on Blockchain. IACR Cryptology ePrint Archive (2017)"},{"key":"40_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-319-99136-8_20","volume-title":"Information Security","author":"B Yu","year":"2018","unstructured":"Yu, B., Liu, J.K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P., Au, M.H.: Platform-independent secure blockchain-based voting system. In: Chen, L., Manulis, M., Schneider, S. (eds.) ISC 2018. LNCS, vol. 11060, pp. 369\u2013386. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-99136-8_20"},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston (1983). \n                      https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18"},{"key":"40_CR12","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"40_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/357980.358017","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978). \n                      https:\/\/doi.org\/10.1145\/357980.358017","journal-title":"Commun. ACM"},{"key":"40_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7","volume-title":"Advances in Cryptology","year":"1985","unstructured":"Blakley, G.R., Chaum, D. (eds.): CRYPTO 1984. LNCS, vol. 196. Springer, Heidelberg (1985). \n                      https:\/\/doi.org\/10.1007\/3-540-39568-7"},{"key":"40_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56\u201372. Springer, Heidelberg (2004). \n                      https:\/\/doi.org\/10.1007\/978-3-540-28628-8_4"},{"key":"40_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/11832072_8","volume-title":"Security and Cryptography for Networks","author":"MH Au","year":"2006","unstructured":"Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111\u2013125. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/11832072_8"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. Cryptology ePrint Archive, IACR (2016)","DOI":"10.1007\/978-3-319-45572-3_1"},{"key":"40_CR18","unstructured":"He, Q., Su, Z.: A new practical secure e-voting scheme. In: 14th International Information Security Conference (SEC 1998), IFIP\/SEC (1998)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24296-1_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T22:20:01Z","timestamp":1561760401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24296-1_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242954","9783030242961"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24296-1_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}