{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:25:01Z","timestamp":1759091101990,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_20","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T15:22:11Z","timestamp":1291648931000},"page":"281-295","source":"Crossref","is-referenced-by-count":6,"title":["Proving Coercion-Resistance of Scantegrity II"],"prefix":"10.1007","author":[{"given":"Ralf","family":"K\u00fcsters","sequence":"first","affiliation":[]},{"given":"Tomasz","family":"Truderung","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Vogt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1145\/195058.195407","volume-title":"Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (STOC 1994)","author":"J.C. Benaloh","year":"1994","unstructured":"Benaloh, J.C., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (STOC 1994), pp. 544\u2013553. ACM Press, New York (1994)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-77493-8_10","volume-title":"E-Voting and Identity","author":"J.-M. Bohli","year":"2007","unstructured":"Bohli, J.-M., M\u00fcller-Quade, J., R\u00f6hrich, S.: Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol.\u00a04896, pp. 111\u2013124. Springer, Heidelberg (2007)"},{"issue":"1","key":"20_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D. Chaum","year":"2004","unstructured":"Chaum, D.: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security & Privacy\u00a02(1), 38\u201347 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T.: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. In: USENIX\/ACCURATE Electronic Voting Technology (EVT 2008). USENIX Association (2008), http:\/\/www.scantegrity.org\/elections.php","DOI":"10.1109\/TIFS.2009.2034919"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/SP.2008.32","volume-title":"2008 IEEE Symposium on Security and Privacy (S&P 2008)","author":"M.R. Clarkson","year":"2008","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a Secure Voting System. In: 2008 IEEE Symposium on Security and Privacy (S&P 2008), pp. 354\u2013368. IEEE Computer Society, Los Alamitos (2008)"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/SFCS.1985.2","volume-title":"26th Annual Symposium on Foundations of Computer Science (FOCS 1985)","author":"J.D. Cohen","year":"1985","unstructured":"Cohen, J.D., Fischer, M.J.: A Robust and Verifiable Cryptographically Secure Election Scheme (Extended Abstract). In: 26th Annual Symposium on Foundations of Computer Science (FOCS 1985), pp. 372\u2013382. IEEE, Los Alamitos (1985)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/CSFW.2006.8","volume-title":"Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW 2006)","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Coercion-Resistance and Receipt-Freeness in Electronic Voting. In: Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW 2006), pp. 28\u201339. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1102199.1102213","volume-title":"Proceedings of Workshop on Privacy in the Eletronic Society (WPES 2005)","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant Electronic Elections. In: Proceedings of Workshop on Privacy in the Eletronic Society (WPES 2005), pp. 61\u201370. ACM Press, New York (2005)"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/CSFW.2006.30","volume-title":"Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW-19 2006)","author":"R. K\u00fcsters","year":"2006","unstructured":"K\u00fcsters, R.: Simulation-Based Security with Inexhaustible Interactive Turing Machines. In: Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW-19 2006), pp. 309\u2013320. IEEE Computer Society, Los Alamitos (2006)"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/SP.2009.13","volume-title":"2009 IEEE Symposium on Security and Privacy (S&P 2009)","author":"R. K\u00fcsters","year":"2009","unstructured":"K\u00fcsters, R., Truderung, T.: An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. In: 2009 IEEE Symposium on Security and Privacy (S&P 2009), pp. 251\u2013266. IEEE Computer Society, Los Alamitos (2009)"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/CSF.2010.16","volume-title":"23th IEEE Computer Security Foundations Symposium, CSF 2010","author":"R. K\u00fcsters","year":"2010","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: A Game-based Definition of Coercion-Resistance and its Applications. In: 23th IEEE Computer Security Foundations Symposium, CSF 2010, pp. 122\u2013136. IEEE Computer Society, Los Alamitos (2010)"},{"key":"20_CR13","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010)","author":"R. K\u00fcsters","year":"2010","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Accountability: Definition and Relationship to Verifiability. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010). ACM, New York (2010, to appear); Also available as Technical Report 2010\/236, Cryptology ePrint Archive (2010), http:\/\/eprint.iacr.org\/2010\/236\/"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Proving Coercion-Resistance of Scantegrity II. Technical Report 502, Cryptology ePrint Archive (2010), http:\/\/eprint.iacr.org\/2010\/502\/","DOI":"10.1007\/978-3-642-17650-0_20"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11818175_22","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"T. Moran","year":"2006","unstructured":"Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting With Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 373\u2013392. Springer, Heidelberg (2006)"},{"key":"20_CR16","unstructured":"Neff, C.A.: Practical High Certainty Intent Verification for Encrypted Votes, http:\/\/www.votehere.com\/old\/vhti\/documentation\/vsv-2.0.3638.pdf"},{"key":"20_CR17","unstructured":"Rivest, R.L., Smith, W.D.: Three Voting Protocols: ThreeBallot, VAV and Twin. In: USENIX\/ACCURATE Electronic Voting Technology, EVT 2007 (2007)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Ryan, P.Y.A.: A variant of the Chaum voter-verifiable scheme. In: Water, Innovation, Technology & Sustainability (WITS 2005), pp. 81\u201388 (2005)","DOI":"10.1145\/1045405.1045414"},{"key":"20_CR19","unstructured":"Teague, V., Ramchen, K., Naish, L.: Coercion-Resistant tallying for STV voting. In: IAVoSS Workshop On Trustworthy Elections, WOTE 2008 (2008)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T11:24:26Z","timestamp":1685877866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}