{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:29:52Z","timestamp":1743157792697,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319223889"},{"type":"electronic","value":"9783319223896"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22389-6_24","type":"book-chapter","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T02:59:08Z","timestamp":1439175548000},"page":"334-347","source":"Crossref","is-referenced-by-count":0,"title":["Elliptic Curve Array Ballots for Homomorphic Tallying Elections"],"prefix":"10.1007","author":[{"given":"Maria","family":"dels \u00c0ngels Cerver\u00f3","sequence":"first","affiliation":[]},{"given":"V\u00edctor","family":"Mateu","sequence":"additional","affiliation":[]},{"given":"Santi","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Josep Maria","family":"Miret","sequence":"additional","affiliation":[]},{"given":"Francesc","family":"Seb\u00e9","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","first-page":"335","volume":"17","author":"B Adida","year":"2008","unstructured":"Adida, B.: Helios: web-based open-audit voting. USENIX Secur. Symp. 17, 335\u2013348 (2008)","journal-title":"USENIX Secur. Symp."},{"key":"24_CR2","unstructured":"Adida, B., Pereira, O., Marneffe, O.D., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of helios. In: Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE) (2009)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-10178-1_4","volume-title":"Electronic Government and the Information Systems Perspective","author":"M\u00c0 Cerver\u00f3","year":"2014","unstructured":"Cerver\u00f3, M.\u00c0., Mateu, V., Miret, J.M., Seb\u00e9, F., Valera, J.: An efficient homomorphic E-Voting system over elliptic curves. In: K\u0151, A., Francesconi, E. (eds.) EGOVIS 2014. LNCS, vol. 8650, pp. 41\u201353. Springer, Heidelberg (2014)"},{"issue":"10","key":"24_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Cohen, J.D., Fischer, M.J.: A robust and verifiable cryptographically secure election scheme. In: 26th Annual Symposium on Foundations of Computer Science (FOCS), pp. 372\u2013382 (1985)","DOI":"10.1109\/SFCS.1985.2"},{"key":"24_CR7","unstructured":"US Department of Commerce, N.I.o.S., Technology: Secure hash standard. Federal Information Processing Standard# 180\u20132 56, 57\u201371 (1994)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I.B., Schoenmakers, B.: Proof of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on Advances in Cryptology. pp. 10\u201318. Springer-Verlag, New York (1985)","DOI":"10.1007\/3-540-39568-7_2"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/11496137_32","volume-title":"Applied Cryptography and Network Security","author":"J Groth","year":"2005","unstructured":"Groth, J.: Non-interactive zero-knowledge arguments for voting. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 467\u2013482. Springer, Heidelberg (2005)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society. pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44987-6_6","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J Katz","year":"2001","unstructured":"Katz, J., Myers, S., Ostrovsky, R.: Cryptographic counters and applications to electronic voting. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 78\u201392. Springer, Heidelberg (2001)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-45664-3_10","volume-title":"Public Key Cryptography","author":"A Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 141\u2013158. Springer, Heidelberg (2002)"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-22961-9_29","volume-title":"Electronic Government and the Information Systems Perspective","author":"V Mateu","year":"2011","unstructured":"Mateu, V., Miret, J.M., Seb\u00e9, F.: Verifiable encrypted redundancy for mix-type remote electronic voting. In: Andersen, K.N., Francesconi, E., Gr\u00f6nlund, \u00c5., van Engers, T.M. (eds.) EGOVIS 2011. LNCS, vol. 6866, pp. 370\u2013385. Springer, Heidelberg (2011)"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/3-540-47790-X_19","volume-title":"Information Security","author":"M Ohkubo","year":"1999","unstructured":"Ohkubo, M., Miura, F., Abe, M., Fujioka, A., Okamoto, T.: An improvement on a practical secret voting scheme. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 225\u2013234. Springer, Heidelberg (1999)"},{"issue":"6","key":"24_CR18","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.jss.2011.01.001","volume":"84","author":"K Peng","year":"2011","unstructured":"Peng, K.: An efficient shuffling based evoting scheme. J. Sys. Softw. 84(6), 906\u2013922 (2011)","journal-title":"J. Sys. Softw."},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-30556-9_6","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"K Peng","year":"2004","unstructured":"Peng, K., Aditya, R., Boyd, C., Dawson, E., Lee, B.: Multiplicative homomorphic e-voting. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 61\u201372. Springer, Heidelberg (2004)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-642-18178-8_32","volume-title":"Information Security","author":"K Peng","year":"2011","unstructured":"Peng, K., Bao, F.: Efficient multiplicative homomorphic e-voting. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 381\u2013393. Springer, Heidelberg (2011)"},{"issue":"6","key":"24_CR21","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/j.comcom.2009.11.013","volume":"33","author":"F Seb\u00e9","year":"2010","unstructured":"Seb\u00e9, F., Miret, J.M., Pujol\u00e0s, J., Puiggali, J.: Simple and efficient hash-based verifiable mixing for remote electronic voting. Comput. Commun. 33(6), 667\u2013675 (2010)","journal-title":"Comput. Commun."},{"key":"24_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The Arithmetic of Elliptic Curves","author":"JH Silverman","year":"2009","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, vol. 2. Springer-verlag, Heidelberg (2009)"},{"issue":"1","key":"24_CR23","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.jnca.2012.05.005","volume":"36","author":"X Yi","year":"2013","unstructured":"Yi, X., Okamoto, E.: Practical internet voting system. J. Netw. Comput. Appl. 36(1), 378\u2013387 (2013)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Electronic Government and the Information Systems Perspective"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22389-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:24:01Z","timestamp":1559215441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-22389-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319223889","9783319223896"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22389-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}