{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:00:49Z","timestamp":1765357249769,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031235788"},{"type":"electronic","value":"9783031235795"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-23579-5_7","type":"book-chapter","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T09:04:55Z","timestamp":1671095095000},"page":"88-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Electronic Voting Scheme Based on Blockchain and SM2 Cryptographic Algorithm Zero-Knowledge Proof"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Lijuan","sequence":"first","affiliation":[]},{"given":"Li","family":"Dunyue","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Rui","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Yongbin","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Rouxin","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Ziyang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,16]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Commun. ACM. 28(2), 84\u201388 (198l)","DOI":"10.1145\/358549.358563"},{"key":"7_CR2","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. www.bitcoin.org (2008)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18, 186\u2013208 (1989)","DOI":"10.1137\/0218012"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bunz, B., et al.: Bulletproofs: Short Proofs for Confidential Transactions and More. IEEE Symposium on Security and Privacy, pp. 315\u2013334 (2018)","DOI":"10.1109\/SP.2018.00020"},{"issue":"17","key":"7_CR5","doi-asserted-by":"publisher","first-page":"5874","DOI":"10.3390\/s21175874","volume":"21","author":"J Uzma","year":"2021","unstructured":"Uzma, J., Ab, A.M.J., Zarina, S.: Blockchain for electronic voting system\u2014review and open research challenges. Sensors 21(17), 5874 (2021)","journal-title":"Sensors"},{"issue":"12","key":"7_CR6","doi-asserted-by":"publisher","first-page":"3958","DOI":"10.3390\/s21123958","volume":"21","author":"S JaeGeun","year":"2021","unstructured":"JaeGeun, S., SungJun, M., JuWook, J.: A scalable implementation of anonymous voting over ethereum blockchain. Sensors 21(12), 3958 (2021)","journal-title":"Sensors"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: ProcAuscrypt92 Gold Coast Queensland Australia, vol. 718, pp. 244\u2013251 (December 1992)","DOI":"10.1007\/3-540-57220-1_66"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: International Workshop on Public Key Cryptography, pp. 141\u2013158. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-45664-3_10","DOI":"10.1007\/3-540-45664-3_10"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1049\/iet-ifs.2008.0127","volume":"4","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.Y.A., Zielinski, P.: Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2), 62\u201367 (2010)","journal-title":"IET Inf. Secur."},{"issue":"8","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1360\/crad20060814","volume":"43","author":"H Zhong","year":"2006","unstructured":"Zhong, H., Huang, L., Luo, Y.: A multi-candidate electronic voting scheme based on secure sum protocol. J. Comput. Res. Dev. 43(8), 1405\u20131410 (2006)","journal-title":"J. Comput. Res. Dev."},{"issue":"25","key":"7_CR11","first-page":"217","volume":"48","author":"P Sun","year":"2012","unstructured":"Sun, P., Liu, Y., Yan, J.: Secure E-voting scheme with multi-candidates. Comput. Eng. Appl. 48(25), 217\u2013219 (2012)","journal-title":"Comput. Eng. Appl."},{"issue":"9","key":"7_CR12","first-page":"1667","volume":"37","author":"G Liu","year":"2015","unstructured":"Liu, G., Liu, Y.N., Wang, D.: A verifiable e-voting scheme with multi-candidates. Comput. Eng. Sci. 37(9), 1667\u20131670 (2015)","journal-title":"Comput. Eng. Sci."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Chan, T.: How to vote privately using bitcoin. In: International Conference on Information & Communications Security. Springer International Publishing, Cham (2015)","DOI":"10.1007\/978-3-319-29814-6_8"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Ma, S., Deng, Y., He, D., Zhang, J., Xie, X.: An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain. IEEE Trans. Dependable Secure Comput. 18(2), 641\u2013651 (2021)","DOI":"10.1109\/TDSC.2020.2969418"},{"issue":"1","key":"7_CR15","first-page":"14","volume":"10","author":"PC Jason","year":"2017","unstructured":"Jason, P.C., Yuichi, K.: E-voting system based on the bitcoin protocol and blind signatures. Trans. Math. Model. Appl. 10(1), 14\u201322 (2017)","journal-title":"Trans. Math. Model. Appl."},{"key":"7_CR16","unstructured":"Yu, T., Cao, C., Wang, L., Xu, L.: Anonymous electronic voting scheme based on alliance chain. Cyberspace Secur. 10(12), 22\u201329 (2019)"},{"issue":"09","key":"7_CR17","first-page":"275","volume":"47","author":"P Hongquan","year":"2020","unstructured":"Hongquan, P., Zhe, C., Ting, L., Jintao, R.: Research review of secure electronic voting scheme. Comput. Sci. 47(09), 275\u2013282 (2020)","journal-title":"Comput. Sci."},{"key":"7_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20","volume-title":"A Smart Contract for Boardroom Voting with Maximum Voter Privacy","author":"P Mccorry","year":"2017","unstructured":"Mccorry, P., Shahandashti, S.F., Hao, F.: A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Springer, Cham (2017)"},{"issue":"12","key":"7_CR19","first-page":"17","volume":"3","author":"D Youkang","year":"2017","unstructured":"Youkang, D., Dawei, Z., Zhen, H., Liang, C.: Electronic voting system for board of directors based on alliance blockchain. J. Net. Inform. Secur. 3(12), 17\u201323 (2017)","journal-title":"J. Net. Inform. Secur."},{"key":"7_CR20","unstructured":"Shao, Q., Hong, H., Li, B.: Research on blockchain electronic voting scheme based on Elgamal strong blind signature. In: Small Microcomputer System, pp. 1\u20138. http:\/\/kns.cnki.net\/kcms\/detail\/21.1106.TP.20201231.1350.008.html (3 November 2021)"},{"key":"7_CR21","unstructured":"Lai, H.: Research and Design of Anonymous Electronic Voting Scheme Based on Blockchain. Jiangxi University of Science and Technology (2020)"},{"key":"7_CR22","unstructured":"Dong, Y.: Design and Implementation of a Secure Electronic Voting System Based on Blockchain. Beijing Jiaotong University (2019)"},{"key":"7_CR23","unstructured":"Yan, C.: Research and Design of Secure Voting System Based on Blockchain. Hangzhou Dianzi University (2018)"},{"issue":"03","key":"7_CR24","doi-asserted-by":"publisher","first-page":"379","DOI":"10.13868\/j.cnki.jcr.000525","volume":"9","author":"L Weihan","year":"2022","unstructured":"Weihan, L., Zongyang, Z., Zibo, Z., Yi, D.: A survey of concise non-interactive zero-knowledge proofs. J. Cryptogr. 9(03), 379\u2013447 (2022). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000525","journal-title":"J. Cryptogr."},{"issue":"01","key":"7_CR25","first-page":"148","volume":"45","author":"L Chao","year":"2022","unstructured":"Chao, L., Xinyi, H., Debiao, H.: Efficient range proof protocol based on SM2. J. Comput. Sci. 45(01), 148\u2013159 (2022)","journal-title":"J. Comput. Sci."},{"issue":"3","key":"7_CR26","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1137\/080725398","volume":"39","author":"Y Ishai","year":"2009","unstructured":"Ishai, Y., et al.: Zero-knowledge proofs from secure multiparty computation. SIAM J. Comput. 39(3), 1121\u20131152 (2009)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09379-y","volume":"34","author":"B Abdolmaleki","year":"2021","unstructured":"Abdolmaleki, B., Lipmaa, H., Siim, J., Zaj\u0105c, M.: On subversion-resistant SNARKs. J. Cryptol. 34(3), 1\u201342 (2021). https:\/\/doi.org\/10.1007\/s00145-021-09379-y","journal-title":"J. Cryptol."},{"issue":"04","key":"7_CR28","first-page":"711","volume":"43","author":"Y Yatao","year":"2020","unstructured":"Yatao, Y., Yang, Z., Qilin, Z., Yingjie, M., Yuan, G.: Homomorphic weighted electronic voting system based on SEAL library. Chin. J. Comput. 43(04), 711\u2013723 (2020)","journal-title":"Chin. J. Comput."},{"issue":"04","key":"7_CR29","doi-asserted-by":"publisher","first-page":"386","DOI":"10.15888\/j.cnki.csa.008421","volume":"31","author":"L Yawei","year":"2022","unstructured":"Yawei, L., Weiqiong, W., Qiong, X.: Multi-candidate electronic voting scheme based on secure multi-party computing. Comput. Syst. Appl. 31(04), 386\u2013391 (2022). https:\/\/doi.org\/10.15888\/j.cnki.csa.008421","journal-title":"Comput. Syst. Appl."},{"key":"7_CR30","first-page":"61","volume":"08","author":"Z Xuefeng","year":"2019","unstructured":"Xuefeng, Z., Hua, P.: Research on a blind signature scheme based on SM9 algorithm. Inform. Net. Secur. 08, 61\u201367 (2019)","journal-title":"Inform. Net. Secur."},{"key":"7_CR31","first-page":"142","volume":"09","author":"G Tao","year":"2003","unstructured":"Tao, G., Zhitang, L., Peng Jianfen, W., Shizhong.: Blind signature and offline electronic cash protocol based on elliptic curve. J. Commun. 09, 142\u2013146 (2003)","journal-title":"J. Commun."},{"issue":"3","key":"7_CR32","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23579-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T20:10:17Z","timestamp":1671135017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23579-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031235788","9783031235795"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23579-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icws","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EADS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}