{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:03Z","timestamp":1759092183170,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642174001"},{"type":"electronic","value":"9783642174018"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17401-8_8","type":"book-chapter","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T06:36:50Z","timestamp":1291185410000},"page":"98-114","source":"Crossref","is-referenced-by-count":6,"title":["Versatile Pr\u00eat \u00e0 Voter: Handling Multiple Election Methods with a Unified Interface"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Xia","sequence":"first","affiliation":[]},{"given":"Chris","family":"Culnane","sequence":"additional","affiliation":[]},{"given":"James","family":"Heather","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Sriramkrishnan","family":"Srinivasan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Adida, B., Neff, A.: Efficient receipt-free ballot casting resistant to covert channel. In: EVT 2009 (2009)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Adida, B., Rivest, R.L.: Scratch & Vote: self-contained paper-based cryptographic voting. In: WPES 2006, pp. 29\u201340 (2006)","DOI":"10.1145\/1179601.1179607"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: PODC 2001, pp. 274\u2013283 (2001)","DOI":"10.1145\/383962.384044"},{"key":"8_CR4","unstructured":"Benaloh, J.: Towards simple verifiable elections. In: WOTE 2006, pp. 61\u201368 (2006)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Moran, T., Ramchen, K., Naish, L., Teague, V.: Shuffle-Sum: coercion resistant verifiable tallying for STV voting. In: IEEE Transactions on Information Forensics and Security (December 2009)","DOI":"10.1109\/TIFS.2009.2033757"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-77493-8_10","volume-title":"E-Voting and Identity","author":"J.-M. Bohli","year":"2007","unstructured":"Bohli, J.-M., M\u00fcller-Quade, J., R\u00f6hrich, S.: Bingo Voting: secure and coercion-free voting using a trusted random number generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 111\u2013124. Springer, Heidelberg (2007)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T.: Scantegrity II: end-to-end verifiable for optical scan election systems using invisible ink confirmation codes. In: EVT 2008 (2008)","DOI":"10.1109\/MSP.2008.70"},{"issue":"3","key":"8_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2008.70","volume":"6","author":"D. Chaum","year":"2008","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A.T., Vora, P.: Scantegrity: end-to-end voter verifiable optical-scan voting. Journal of IEEE Security & Privacy\u00a06(3), 40\u201346 (2008)","journal-title":"Journal of IEEE Security & Privacy"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11555827_8","volume-title":"Computer Security \u2013 ESORICS 2005","author":"D. Chaum","year":"2005","unstructured":"Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 118\u2013139. Springer, Heidelberg (2005)"},{"key":"8_CR10","unstructured":"Clarkson, M., Myers, A.: Coercion-resistant remote voting using decryption mixes. In: FEE 2005 (2005)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/11681878_15","volume-title":"Theory of Cryptography","author":"I. Damg\u00e5rd","year":"2006","unstructured":"Damg\u00e5rd, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditional secure constant-rounds multi party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 285\u2013304. Springer, Heidelberg (2006)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-44987-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"I. Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 152\u2013165. Springer, Heidelberg (2001)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45472-1_7","volume-title":"Financial Cryptography","author":"P.-A. Fouque","year":"2001","unstructured":"Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, Springer, Heidelberg (2001)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"P.-A. Fouque","year":"2001","unstructured":"Fouque, P.-A., Stern, J.: Fully distributed threshold RSA under standard assumptions. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, Springer, Heidelberg (2001)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Heather, J.: Implementing STV securely in Pr\u00eat \u00e0 Voter. In: CSF 2007, pp. 157\u2013169 (2007)","DOI":"10.1109\/CSF.2007.22"},{"key":"8_CR16","unstructured":"Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security Symposium, pp. 339\u2013353 (2002)"},{"key":"8_CR17","unstructured":"Lundin, D.: Component based electronic voting systems. In: Proceedings of IAVoSS Workshop on Trustworthy Elections (WOTE 2007), Ottawa, Canada, pp. 11\u201316 (2007)"},{"key":"8_CR18","unstructured":"Neff, A.: Practical high certainly intent verification for encrypted votes. VoteHere document (2004)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-24852-1_5","volume-title":"Applied Cryptography and Network Security","author":"L. Nguyen","year":"2004","unstructured":"Nguyen, L., Safavi-Naini, R., Kurosawa, K.: Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 61\u201375. Springer, Heidelberg (2004)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on discrete logarithms residues. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-04135-8_9","volume-title":"E-Voting and Identity","author":"K. Peng","year":"2009","unstructured":"Peng, K., Bao, F.: A design of secure preferential e-voting. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) VOTE-ID 2009. LNCS, vol.\u00a05767, pp. 141\u2013156. Springer, Heidelberg (2009)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/11535218_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"K. Peng","year":"2005","unstructured":"Peng, K., Boyd, C., Dawson, E.: Simple and efficient shuffling with provable correctness and ZK privacy. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 188\u2013204. Springer, Heidelberg (2005)"},{"key":"8_CR23","unstructured":"Popoveniuc, S., Vora, P.: A framework for secure electronic voting. In: Proceedings of IAVoSS Workshop On Trustworthy Elections (WOTE 2008), Leuven, Belgium (2008)"},{"key":"8_CR24","unstructured":"Punchscan, \n                    \n                      http:\/\/www.punchscan.org"},{"key":"8_CR25","unstructured":"Rivest, R.L., Smith, W.D.: Three voting protocols: ThreeBallot, VAV, and Twin. In: Proceedings of the 2nd USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT 2007), Boston, MA (2007)"},{"key":"8_CR26","unstructured":"Ryan, P.Y.A., Peacock, T.: Threat analysis of cryptographic election schemes. Technical Report of University of Newcastle, CS-TR:971 (2006)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/11863908_20","volume-title":"Computer Security \u2013 ESORICS 2006","author":"P.Y.A. Ryan","year":"2006","unstructured":"Ryan, P.Y.A., Schneider, S.: Pr\u00eat \u00e0 Voter with re-encryption mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 313\u2013326. Springer, Heidelberg (2006)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/11761679_31","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"B. Schoenmakers","year":"2006","unstructured":"Schoenmakers, B., Tuyls, P.: Efficient binary conversion for paillier encrypted values. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 522\u2013537. Springer, Heidelberg (2006)"},{"key":"8_CR29","unstructured":"Teague, V., Ramchen, K., Naish, L.: Coercion-resistant tallying for STV voting. In: EVT 2008 (2008)"},{"issue":"3","key":"8_CR30","first-page":"258","volume":"6","author":"P.-Y. Ting","year":"2008","unstructured":"Ting, P.-Y., Huang, X.-W.: Distributed paillier plaintext equivalence test. International Journal of Network Security\u00a06(3), 258\u2013264 (2008)","journal-title":"International Journal of Network Security"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-04135-8_8","volume-title":"E-Voting and Identity","author":"R. Wen","year":"2009","unstructured":"Wen, R., Buckland, R.: Minimum disclosure counting for the alternative vote. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) VOTE-ID 2009. LNCS, vol.\u00a05767, pp. 122\u2013140. Springer, Heidelberg (2009)"},{"key":"8_CR32","unstructured":"Xia, Z., Schneider, S., Heather, J., Ryan, P.Y.A., Lundin, D., Peel, R., Howard, P.: Pr\u00eat \u00e0 Voter: All-In-One. In: WOTE 2007, pp. 47\u201356 (2007)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17401-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:19:35Z","timestamp":1558293575000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17401-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642174001","9783642174018"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17401-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}