{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:44:32Z","timestamp":1748583872551,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319222691"},{"type":"electronic","value":"9783319222707"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22270-7_1","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T03:48:50Z","timestamp":1439351330000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["2015 Neuch\u00e2tel\u2019s Cast-as-Intended Verification Mechanism"],"prefix":"10.1007","author":[{"given":"David","family":"Galindo","sequence":"first","affiliation":[]},{"given":"Sandra","family":"Guasch","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Puiggal\u00ed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"key":"1_CR1","unstructured":"Crytographic key length recommendation (2015). http:\/\/www.keylength.com"},{"key":"1_CR2","first-page":"335","volume-title":"USENIX Security Symposium","author":"B Adida","year":"2008","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335\u2013348. USENIX Association, Berkeley (2008)"},{"key":"1_CR3","unstructured":"Adida, B., de Marneffe, O., Pereira, O.: Helios voting system. http:\/\/heliosvoting.org"},{"key":"1_CR4","unstructured":"Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (2009)"},{"key":"1_CR5","unstructured":"Adida, B., Neff, C.A.: Ballot casting assurance. In: Wallach, D.S., Rivest, R.L. (eds.) 2006 USENIX\/ACCURATE Electronic Voting Technology Workshop, EVT 2006, Vancouver, BC, Canada, 1 August 2006. USENIX Association (2006)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-642-32747-6_3","volume-title":"E-Voting and Identity","author":"JP Allepuz","year":"2012","unstructured":"Allepuz, J.P., Castell\u00f3, S.G.: Internet voting system with cast as intended verification. In: Kiayias, A., Lipmaa, H. (eds.) VoteID 2011. LNCS, vol. 7187, pp. 36\u201352. Springer, Heidelberg (2012)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M.: New proofs for NMAC and HMAC: security without collision-resistance. Cryptology ePrint Archive, Report 2006\/043 (2006)","DOI":"10.1007\/11818175_36"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security. CCS 1993, pp. 62\u201373. . ACM, New York (1993)","DOI":"10.1145\/168588.168596"},{"key":"1_CR9","unstructured":"Benaloh, J.: Simple verifiable elections. In: Proceedings of the USENIX\/Accurate Electronic Voting Technology Workshop 2006. EVT 2006, p. 5. USENIX Association, Berkeley (2006)"},{"key":"1_CR10","unstructured":"Bernhard, D., Pereira, O., Warinschi, B.: On necessary and sufficient conditions for private ballot submission. Cryptology ePrint Archive, Report 2012\/236 (2012)"},{"key":"1_CR11","unstructured":"Chancellery, S.F.: Explications relatives \u00e0 l\u2019ordonnance de la chancellerie f\u00e9d\u00e9rale sur le vote \u00e9lectronique (OVotE) (2013). http:\/\/www.bk.admin.ch\/themen\/pore\/evoting\/07979"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"1_CR14","unstructured":"Gerlach, J., Gasser, U.: Three case studies from Switzerland: E-voting (2009)"},{"key":"1_CR15","unstructured":"Gj\u00f8steen, K.: Analysis of an internet voting protocol. Cryptology ePrint Archive, Report 2010\/380 (2010)"},{"key":"1_CR16","unstructured":"Gjosteen, K.: The Norwegian internet voting protocol. Cryptology ePrint Archive, Report 2013\/473 (2013)"},{"key":"1_CR17","unstructured":"Kripp, M.J., Volkamer, M., Grimm, R. (eds.): 5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft f\u00fcr Informatik and E-Voting.CC, 11\u201314 July 2012, Castle Hofen, Bregenz, Austria, LNI, vol. 205. GI (2012)"},{"key":"1_CR18","unstructured":"Lipmaa, H.: Two simple code-verification voting protocols. Cryptology ePrint Archive, Report 2011\/317 (2011)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_1","volume-title":"Financial Cryptography","author":"D Malkhi","year":"2003","unstructured":"Malkhi, D., Margo, O.: E-voting without \u2018Cryptography\u2019. In: Blaze, Matt (ed.) FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)"},{"key":"1_CR20","unstructured":"Neuchatel: Guichet unique citizen portal. https:\/\/www.guichetunique.ch\/"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"1_CR22","unstructured":"Pinault, T., Courtade, P.: E-voting at expatriates\u2019 MPs elections in France. In: Kripp et al. [17], pp. 189\u2013195"},{"key":"1_CR23","unstructured":"Puigalli, J., Guasch, S.: Cast-as-intended verification in Norway. In: Kripp et al. [17], pp. 49\u201363"},{"key":"1_CR24","unstructured":"Rosen, A., Ta-shma, A., Riva, B., Ben-Nun, J.: Wombat voting. http:\/\/www.wombat-voting.com\/"},{"key":"1_CR25","first-page":"349","volume-title":"USENIX Security Symposium","author":"D Sandler","year":"2008","unstructured":"Sandler, D., Derr, K., Wallach, D.S.: Votebox: a tamper-evident, verifiable electronic voting system. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 349\u2013364. USENIX Association, Berkeley (2008)"},{"issue":"3","key":"1_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C Schnorr","year":"1991","unstructured":"Schnorr, C.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22270-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:28:33Z","timestamp":1676471313000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22270-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319222691","9783319222707"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22270-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}