{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:37:38Z","timestamp":1766137058809,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319986531"},{"type":"electronic","value":"9783319986548"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99136-8_20","type":"book-chapter","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T08:39:41Z","timestamp":1534235981000},"page":"369-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["Platform-Independent Secure Blockchain-Based Voting System"],"prefix":"10.1007","author":[{"given":"Bin","family":"Yu","sequence":"first","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Steinfeld","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Rimba","sequence":"additional","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,15]]},"reference":[{"key":"20_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335\u2013348 (2008)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11774716_9","volume-title":"Public Key Infrastructure","author":"MH Au","year":"2006","unstructured":"Au, M.H., Chow, S.S.M., Susilo, W., Tsang, P.P.: Short linkable ring signatures revisited. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 101\u2013115. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11774716_9"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/11941378_26","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"MH Au","year":"2006","unstructured":"Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Constant-size ID-based linkable and revocable-iff-linked ring signature. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 364\u2013378. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11941378_26"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-72163-5_8","volume-title":"Information Security Practice and Experience","author":"MH Au","year":"2007","unstructured":"Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Certificate based (linkable) ring signature. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 79\u201392. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72163-5_8"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2012.10.031","volume":"469","author":"MH Au","year":"2013","unstructured":"Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469, 1\u201314 (2013)","journal-title":"Theor. Comput. Sci."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Baudron, O., Fouque, P.A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, pp. 274\u2013283. ACM (2001)","DOI":"10.1145\/383962.384044"},{"issue":"2","key":"20_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/11958239_12","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"SSM Chow","year":"2006","unstructured":"Chow, S.S.M., Susilo, W., Yuen, T.H.: Escrowed linkability of ring signatures and its applications. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 175\u2013192. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11958239_12"},{"key":"20_CR9","unstructured":"Chow, S.S., Liu, J.K., Wong, D.S.: Robust receipt-free election system with ballot secrecy and verifiability. In: NDSS, vol. 8, pp. 81\u201394 (2008)"},{"issue":"5","key":"20_CR10","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1002\/ett.4460080506","volume":"8","author":"R Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Trans. Emerg. Telecommun. Technol. 8(5), 481\u2013490 (1997)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"20_CR11","unstructured":"follow my vote. https:\/\/followmyvote.com\/ . Accessed 24 June 2017"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology \u2014 AUSCRYPT \u201992","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244\u2013251. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57220-1_66"},{"key":"20_CR13","unstructured":"Gentry, C.: A Fully Homomorphic Encryption Scheme. Stanford University (2009)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539\u2013556. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_38"},{"key":"20_CR15","unstructured":"Hopwood, D., Bowe, S., Hornby, T., Wilcox, N.: Zcash protocol specification. Technical report, 2016\u20131.10. Zerocoin Electric Coin Company (2016)"},{"issue":"2","key":"20_CR16","first-page":"47","volume":"1","author":"R Joaquim","year":"2003","unstructured":"Joaquim, R., Z\u00faquete, A., Ferreira, P.: Revs\u2013a robust electronic voting system. IADIS Int. J. WWW\/Internet 1(2), 47\u201363 (2003)","journal-title":"IADIS Int. J. WWW\/Internet"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/3-540-44987-6_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Katz","year":"2001","unstructured":"Katz, J., Myers, S., Ostrovsky, R.: Cryptographic counters and applications to electronic voting. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 78\u201392. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_6"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/3-540-45664-3_10","volume-title":"Public Key Cryptography","author":"A Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 141\u2013158. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45664-3_10"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Laskowski, S.J., Autry, M., Cugini, J., Killam, W., Yen, J.: Improving the usability and accessibility of voting systems and products. NIST Special Publication, 256,500 (2004)","DOI":"10.6028\/NIST.SP.500-256"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-36552-4_27","volume-title":"Information Security and Cryptology \u2014 ICISC 2002","author":"B Lee","year":"2003","unstructured":"Lee, B., Kim, K.: Receipt-free electronic voting scheme with a tamper-resistant randomizer. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 389\u2013406. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36552-4_27"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Li, C.T., Hwang, M.S., Lai, Y.C.: A verifiable electronic voting scheme over the internet. In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, pp. 449\u2013454. IEEE (2009)","DOI":"10.1109\/ITNG.2009.93"},{"issue":"1","key":"20_CR23","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TKDE.2013.17","volume":"26","author":"JK Liu","year":"2014","unstructured":"Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Linkable ring signature with unconditional anonymity. IEEE Trans. Knowl. Data Eng. 26(1), 157\u2013165 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11908739_8","volume-title":"Advances in Information and Computer Security","author":"JK Liu","year":"2006","unstructured":"Liu, J.K., Susilo, W., Wong, D.S.: Ring signature with designated linkability. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 104\u2013119. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11908739_8"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-27800-9_28","volume-title":"Information Security and Privacy","author":"JK Liu","year":"2004","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for Ad Hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 325\u2013335. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27800-9_28"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/11424826_65","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"JK Liu","year":"2005","unstructured":"Liu, J.K., Wong, D.S.: Linkable ring signatures: security models and new schemes. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e0, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 614\u2013623. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11424826_65"},{"issue":"6","key":"20_CR27","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1142\/S0129054106004480","volume":"17","author":"JK Liu","year":"2006","unstructured":"Liu, J.K., Wong, D.S.: Enhanced security models and a generic construction approach for linkable ring signature. Int. J. Found. Comput. Sci. 17(6), 1403\u20131422 (2006)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. IACR Cryptology ePrint Archive 2017, 110 (2017)","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 116\u2013125. ACM (2001)","DOI":"10.1145\/501983.502000"},{"key":"20_CR30","unstructured":"Nsw election result could be challenged over ivote security flaw (2015). https:\/\/www.theguardian.com\/australia-news\/2015\/mar\/23\/nsw-election-result-could-be-challenged-over-ivote-security-flaw"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BFb0028157","volume-title":"Security Protocols","author":"T Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25\u201335. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0028157"},{"issue":"9","key":"20_CR32","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1016\/j.mcm.2008.05.015","volume":"48","author":"PY Ryan","year":"2008","unstructured":"Ryan, P.Y.: Pr\u00eat \u00e0 voter with paillier encryption. Math. Comput. Model. 48(9), 1646\u20131662 (2008)","journal-title":"Math. Comput. Model."},{"key":"20_CR33","unstructured":"Tarasov, P., Tewari, H.: Internet voting using zcash. Cryptology ePrint Archive, Report 2017\/585 (2017). http:\/\/eprint.iacr.org\/2017\/585"},{"key":"20_CR34","unstructured":"Theguardian: Why machines are bad at counting votes (2009). https:\/\/www.theguardian.com\/technology\/2009\/apr\/30\/e-voting-electronic-polling-systems"},{"key":"20_CR35","unstructured":"Tivi voting. https:\/\/tivi.io\/ . Accessed 24 June 2017"},{"key":"20_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-16280-0_11","volume-title":"Provable Security","author":"PP Tsang","year":"2010","unstructured":"Tsang, P.P., Au, M.H., Liu, J.K., Susilo, W., Wong, D.S.: A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract). In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol. 6402, pp. 166\u2013183. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16280-0_11"},{"key":"20_CR37","unstructured":"Volkhausen, T.: Paillier cryptosystem: a mathematical introduction. In: Seminar Public-Key Kryptographie (WS 05\/06) bei Prof. Dr. J. Bl\u00f6mer (2006)"},{"key":"20_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"Open Problems in Network Security","author":"M Vukoli\u0107","year":"2016","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdo\u011fan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112\u2013125. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39028-4_9"},{"key":"20_CR39","unstructured":"Weber, S.: A coercion-resistant cryptographic voting protocol-evaluation and prototype implementation. Darmstadt University of Technology (2006). http:\/\/www.cdc.informatik.tudarmstadt.de\/reports\/reports\/StefanWeber.diplom.pdf"},{"key":"20_CR40","unstructured":"Xia, Z., Schneider, S.A., Heather, J., Traor\u00e9, J.: Analysis, improvement, and simplification of pr\u00eat \u00e0 voter with paillier encryption. In: EVT 2008 Proceedings of the Conference on Electronic Voting Technology (2008)"},{"key":"20_CR41","unstructured":"Yu, B., et al.: Platform-independent secure blockchain-based voting system. Cryptology ePrint Archive, change me (2018). http:\/\/eprint.iacr.org\/2018\/"},{"issue":"4","key":"20_CR42","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1093\/comjnl\/bxs115","volume":"56","author":"TH Yuen","year":"2013","unstructured":"Yuen, T.H., Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Efficient linkable and\/or threshold ring signature without random oracles. Comput. J. 56(4), 407\u2013421 (2013)","journal-title":"Comput. J."},{"key":"20_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-29814-6_8","volume-title":"Information and Communications Security","author":"Z Zhao","year":"2016","unstructured":"Zhao, Z., Chan, T.-H.H.: How to vote privately using Bitcoin. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 82\u201396. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29814-6_8"}],"container-title":["Lecture Notes in Computer Science","Developments in Language Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99136-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T04:39:35Z","timestamp":1571719175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99136-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319986531","9783319986548"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99136-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}