{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:51:56Z","timestamp":1774716716648,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138683","type":"print"},{"value":"9783642138690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_8","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"109-123","source":"Crossref","is-referenced-by-count":1,"title":["Lagrangian E-Voting: Verifiability on Demand and Strong Privacy"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Krzywiecki","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miros\u0142aw","family":"Kuty\u0142owski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Dagstuhl Accord (2007), http:\/\/www.dagstuhlaccord.org\/"},{"key":"8_CR2","unstructured":"The E-vote 2011-project Electronic Voting. 2011, http:\/\/www.regjeringen.no\/en\/dep\/krd\/kampanjer\/election_portal\/electronic-voting.html?id=437385"},{"key":"8_CR3","unstructured":"Top-to-bottom Review. Top-to-bottom Report Conducted by Secretary of State Debra Bowen of Many of the Voting Systems Certified for Use in California (2007), http:\/\/www.sos.ca.gov\/elections\/elections_vsr.htm"},{"key":"8_CR4","unstructured":"Adida, B.: Helios: Web-based Open-Audit Voting. In: USENIX Security Symposium 2008, USENIX Association, pp. 335\u2013348 (2008), ISBN 978-1-931971-60-7"},{"key":"8_CR5","unstructured":"Baer, W.S., Borisov, N., Danezis, G., Guerses, S.F., Klonowski, M., Kuty\u0142owski, M., Maier-Rabler, U., Moran, T., Pfitzmann, A., Preneel, B., Sadeghi, A.-R., Vedel, T., Westen, T., Zag\u00f3rski, F., Dutton, W.H.: Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society. In: Social Science Research Network, 1521222 (2009), http:\/\/ssrn.com\/abstract=1521222"},{"key":"8_CR6","unstructured":"Chaum, D.: Punchscan (2005), http:\/\/www.punchscan.org"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Antwerpen, H.V.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 212\u2013216. Springer, Heidelberg (1990)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.: Scantegrity II: End-to-End Voter-Verifiable Optical Scan Election Systems Using Invisible Ink Confirmation Codes. In: USENIX\/ACCURATE EVT 2008 (2008)","DOI":"10.1109\/MSP.2008.70"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11555827_8","volume-title":"Computer Security \u2013 ESORICS 2005","author":"D. Chaum","year":"2005","unstructured":"Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 118\u2013139. Springer, Heidelberg (2005)"},{"key":"8_CR10","unstructured":"Desmedt, Y., Estehghari, S.: Hacking Helios and its Impact. CRYPTO 2009 rump session (2009), http:\/\/www.cs.ucl.ac.uk\/staff\/Y.Desmedt\/IACR\/"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/11556992_24","volume-title":"Information Security","author":"Y. Desmedt","year":"2005","unstructured":"Desmedt, Y., Kurosawa, K.: Electronic Voting: Starting Over? In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 329\u2013343. Springer, Heidelberg (2005)"},{"key":"8_CR12","unstructured":"Garrido, J.M., Schlesinger, R.: Principles of Modern Operating Systems. Jones and Barlett Publishers (2008), ISBN 0-7637-3574-4"},{"key":"8_CR13","unstructured":"Gj\u00f8steen, K.: Analysis of an Internet Voting Protocol. http:\/\/www.regjeringen.no\/en\/dep\/krd\/kampanjer\/election_portal\/electronic-voting\/news-about-the-e-vote-2011-project\/year\/2010\/Description-of-cryptografhic-protocol-.html?id=594906"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/11766155_35","volume-title":"Emerging Trends in Information and Communication Security","author":"M. Gogolewski","year":"2006","unstructured":"Gogolewski, M., Klonowski, M., Kuty\u0142owski, M., Kubiak, P., Lauks, A., Zag\u00f3rski, F.: Kleptographic Attacks on E-voting Schemes. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 494\u2013508. Springer, Heidelberg (2006)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/11935070_13","volume-title":"Cryptology and Network Security","author":"Z. Go\u0142e\u0327biewski","year":"2006","unstructured":"Go\u0142e\u0327biewski, Z., Kuty\u0142owski, M., Zag\u00f3rski, F.: Stealing Secrets with SSL\/TLS and SSH \u2013 Kleptographic Attacks. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol.\u00a04301, pp. 191\u2013202. Springer, Heidelberg (2006)"},{"key":"8_CR16","first-page":"61","volume-title":"ACM Workshop on Privacy in the Electronic Society","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: ACM Workshop on Privacy in the Electronic Society, pp. 61\u201370. ACM, New York (2005)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-540-75651-4_14","volume-title":"Advances in Information and Computer Security","author":"M. Kuty\u0142owski","year":"2007","unstructured":"Kuty\u0142owski, M., Zag\u00f3rski, F.: Coercion-free Internet Voting with Receipts. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 199\u2013213. Springer, Heidelberg (2007)"},{"key":"8_CR18","volume-title":"Towards Trustworthy Election Systems, in State-of-the-Art Survey Series","author":"M. Kuty\u0142owski","year":"2008","unstructured":"Kuty\u0142owski, M., Zag\u00f3rski, F.: Scratch, Click & Vote: E2E Voting over the Internet\u2019. Cryptology ePrint Archive: Report 2008\/314. In: Towards Trustworthy Election Systems, in State-of-the-Art Survey Series. Springer, Heidelberg (2008) (to appear), http:\/\/eprint.iacr.org\/2008\/314"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-540-77493-8_13","volume-title":"E-Voting and Identity","author":"S. Popoveniuc","year":"2007","unstructured":"Popoveniuc, S., Lundin, D.: A Simple Technique for Safely Using Punchscan and Pret a Voter in Mail-in Elections. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 150\u2013155. Springer, Heidelberg (2007)"},{"key":"8_CR20","unstructured":"Rivest, R.L., Smith, W.D.: Three Voting Protocols: Threeballot, Vav, and Twin. In: EVT 2007: Proceedings of the USENIX\/Accurate Electronic Voting Technology on USENIX\/Accurate Electronic Voting Technology Workshop. USENIX Association (2007)"},{"key":"8_CR21","unstructured":"Tarnovsky, C.: Hacking the Smartcard Chip. A presentation at Black Hat DC (2010), http:\/\/www.blackhat.com\/html\/bh-dc-10\/bh-dc-10-briefings.html"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/ARES.2007.108","volume-title":"ARES, Proceedings of the 2nd International Conference on Availability, Reliability and Security","author":"S. Weber","year":"2007","unstructured":"Weber, S., Araujo, R., Buchmann, J.: On Coercion-Resistant Electronic Elections with Linear Work. In: ARES, Proceedings of the 2nd International Conference on Availability, Reliability and Security, pp. 908\u2013916. IEEE Computer Society, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:44:49Z","timestamp":1606185889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}