{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:41:02Z","timestamp":1776102062463,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078902","type":"print"},{"value":"9783032078919","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07891-9_7","type":"book-chapter","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T09:28:07Z","timestamp":1760693287000},"page":"124-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hyperion: Transparent End-to-End Verifiable Voting with\u00a0Coercion Mitigation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4030-6859","authenticated-orcid":false,"given":"Aditya","family":"Damodaran","sequence":"first","affiliation":[]},{"given":"Simon","family":"Rastikian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2785-8301","authenticated-orcid":false,"given":"Peter B.","family":"R\u00f8nne","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1677-9034","authenticated-orcid":false,"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"7_CR1","unstructured":"Adida, B., De\u00a0Marneffe, O., Pereira, O., Quisquater, J.J., et\u00a0al.: Electing a university president using open-audit voting: analysis of real-world use of Helios. EVT\/WOTE 9(10) (2009)"},{"key":"7_CR2","unstructured":"Alsadi, M., Schneider, S.: Verify my vote: voter experience. E-Vote-ID 2020, 280 (2020)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Arnaud, M., Cortier, V., Wiedling, C.: Analysis of an electronic boardroom voting system. In: International Conference on E-Voting and Identity, pp. 109\u2013126. Springer (2013)","DOI":"10.1007\/978-3-642-39185-9_7"},{"key":"7_CR4","unstructured":"Benaloh, J.D.C.: Verifiable secret-ballot elections, Ph.D. thesis, Yale University (1987)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Bernhard, D., Cortier, V., Galindo, D., Pereira, O., Warinschi, B.: Sok: a comprehensive analysis of game-based ballot privacy definitions. In: 2015 IEEE Symposium on Security and Privacy, pp. 499\u2013516. IEEE (2015)","DOI":"10.1109\/SP.2015.37"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bernhard, D., Pereira, O., Warinschi, B.: How not to prove yourself: pitfalls of the Fiat-Shamir heuristic and applications to Helios. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 626\u2013643. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_38"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Bruni, A., Drewsen, E., Sch\u00fcrmann, C.: Towards a mechanized proof of Selene receipt-freeness and vote-privacy. In: International Joint Conference on Electronic Voting, pp. 110\u2013126. Springer (2017)","DOI":"10.1007\/978-3-319-68687-5_7"},{"key":"7_CR8","unstructured":"Camenisch, J.: Group signature schemes and payment systems based on the discrete logarithm problem, Ph.D. thesis, ETH Zurich (1998)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: Beleniosrf: a non-interactive receipt-free electronic voting scheme. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1614\u20131625 (2016)","DOI":"10.1145\/2976749.2978337"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Cortier, V., Galindo, D., Glondu, S., Izabachene, M.: Election verifiability for Helios under weaker trust assumptions. In: European Symposium on Research in Computer Security, pp. 327\u2013344. Springer (2014)","DOI":"10.1007\/978-3-319-11212-1_19"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Cortier, V., Galindo, D., K\u00fcsters, R., M\u00fcller, J., Truderung, T.: Sok: verifiability notions for e-voting protocols. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 779\u2013798. IEEE (2016)","DOI":"10.1109\/SP.2016.52"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cortier, V., Lallemand, J., Warinschi, B.: Fifty shades of ballot privacy: privacy against a malicious board. In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), pp. 17\u201332. IEEE (2020)","DOI":"10.1109\/CSF49147.2020.00010"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3233\/JCS-2012-0458","volume":"21","author":"V Cortier","year":"2013","unstructured":"Cortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89\u2013148 (2013)","journal-title":"J. Comput. Secur."},{"key":"7_CR14","unstructured":"Damodaran, A., Rastikian, S., R\u00f8nne, P.B., Ryan, P.Y.: Hyperion: transparent end-to-end verifiable voting with coercion mitigation. Cryptology ePrint Archive (2024)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Distler, V., Zollinger, M.L., Lallemand, C., Roenne, P.B., Ryan, P.Y., Koenig, V.: Security-visible, yet unseen? In: Proceedings of the 2019 CHI conference on human factors in computing systems, pp. 1\u201313 (2019)","DOI":"10.1145\/3290605.3300835"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Dragan, C.C., et al.: Machine-checked proofs of privacy against malicious boards for Selene & co. In: 35th IEEE Computer Security Foundations Symposium, CSF 2022, pp. 335\u2013347. IEEE (2022)","DOI":"10.1109\/CSF54842.2022.9919663"},{"issue":"4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 186\u2013194. Springer (1986)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Groth, J.: Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 444\u2013459. Springer (2006)","DOI":"10.1007\/11935230_29"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Haenni, R., Locher, P., Koenig, R., Dubuis, E.: Pseudo-code algorithms for verifiable re-encryption mix-nets. In: Financial Cryptography and Data Security, pp. 370\u2013384. Springer (2017)","DOI":"10.1007\/978-3-319-70278-0_23"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Hao, F., Ryan, P.Y.: Real-World Electronic Voting: Design, Analysis and Deployment. CRC Press (2016)","DOI":"10.1201\/9781315371290"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Iovino, V., Rial, A., R\u00f8nne, P.B., Ryan, P.Y.: Using Selene to verify your vote in JCJ. In: International Conference on Financial Cryptography and Data Security, pp. 385\u2013403. Springer (2017)","DOI":"10.1007\/978-3-319-70278-0_24"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Jamroga, W., Roenne, P.B., Ryan, P.Y., Stark, P.B.: Risk-limiting tallies. In: International Joint Conference on Electronic Voting, pp. 183\u2013199. Springer (2019)","DOI":"10.1007\/978-3-030-30625-0_12"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Towards Trustworthy Elections, pp. 37\u201363. Springer (2010)","DOI":"10.1007\/978-3-642-12980-3_2"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., M\u00fcller, J., Scapin, E., Truderung, T.: sElect: a lightweight verifiable remote voting system. In: Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, pp. 341\u2013354. IEEE (2016)","DOI":"10.1109\/CSF.2016.31"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Mosaheb, R., R\u00f8nne, P.B., Ryan, P.Y., Sarfaraz, S.: Direct and transparent voter verification with everlasting receipt-freeness. In: International Joint Conference on Electronic Voting, pp. 124\u2013140. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-72244-8_8"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B.P., Sadeghi, A.R.: Anonymous fingerprinting with direct non-repudiation. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 401\u2013414. Springer (2000)","DOI":"10.1007\/3-540-44448-3_31"},{"issue":"1881","key":"7_CR28","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1098\/rsta.2008.0149","volume":"366","author":"RL Rivest","year":"2008","unstructured":"Rivest, R.L.: On the notion of \u2018software independence\u2019 in voting systems. Philos. Trans. Roy. Soc. A Math. Phys. Eng. Sci. 366(1881), 3759\u20133767 (2008)","journal-title":"Philos. Trans. Roy. Soc. A Math. Phys. Eng. Sci."},{"key":"7_CR29","unstructured":"R\u00f8nne, P.B., Ryan, P.Y., Zollinger, M.L.: Electryo, in-person voting with transparent voter verifiability and eligibility verifiability. arXiv preprint arXiv:2105.14783 (2021)"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Ryan, P.Y.A., R\u00f8nne, P.B., Iovino, V.: Selene: voting with transparent verifiability and coercion-mitigation. In: International Conference on Financial Cryptography and Data Security, pp. 176\u2013192. Springer (2016)","DOI":"10.1007\/978-3-662-53357-4_12"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Ryan, P.Y., Roenne, P.B., Ostrev, D., Orche, F.E.E., Soroush, N., Stark, P.B.: Who was that masked voter? The tally won\u2019t tell! In: International Joint Conference on Electronic Voting, pp. 106\u2013123. Springer (2021)","DOI":"10.1007\/978-3-030-86942-7_8"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Sallal, M., et al.: Augmenting an internet voting system with Selene verifiability using permissioned distributed ledger. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1167\u20131168. IEEE (2020)","DOI":"10.1109\/ICDCS47774.2020.00124"},{"key":"7_CR33","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley (2007)"},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991). https:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Cryptol."},{"key":"7_CR35","doi-asserted-by":"publisher","unstructured":"Terelius, B., Wikstr\u00f6m, D.: Proofs of restricted shuffles. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 100\u2013113. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12678-9_7","DOI":"10.1007\/978-3-642-12678-9_7"},{"key":"7_CR36","unstructured":"Wikstr\u00f6m, D.: User Manual for the Verificatum Mix-Net Version 1.4.0. Verificatum AB, Stockholm, Sweden (2013)"},{"key":"7_CR37","unstructured":"Zollinger, M.L., Distler, V., Roenne, P.B., Ryan, P.Y., Lallemand, C., Koenig, V.: User experience design for e-voting: how mental models align with security mechanisms. arXiv preprint arXiv:2105.14901 (2021)"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Zollinger, M.L., R\u00f8nne, P.B., Ryan, P.Y.: Short paper: mechanized proofs of verifiability and privacy in a paper-based e-voting scheme. In: International Conference on Financial Cryptography and Data Security, pp. 310\u2013318. Springer (2020)","DOI":"10.1007\/978-3-030-54455-3_22"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07891-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T09:28:17Z","timestamp":1760693297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07891-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9783032078902","9783032078919"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07891-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}