{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:12:51Z","timestamp":1725894771846},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642327469"},{"type":"electronic","value":"9783642327476"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32747-6_11","type":"book-chapter","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T08:24:14Z","timestamp":1347438254000},"page":"174-189","source":"Crossref","is-referenced-by-count":2,"title":["Pr\u00eat \u00e1 Voter with Write-Ins"],"prefix":"10.1007","author":[{"given":"Steve","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Sriramkrishnan","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Culnane","sequence":"additional","affiliation":[]},{"given":"James","family":"Heather","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Adida, B.: Helios: Web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335\u2013348. USENIX Association (2008)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Adida, B., Rivest, R.L.: Scratch & vote: self-contained paper-based cryptographic voting. In: Juels, A., Winslett, M. (eds.) WPES, pp. 29\u201340. ACM (2006)","DOI":"10.1145\/1179601.1179607"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Benaloh, J.C., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: STOC, pp. 544\u2013553 (1994)","DOI":"10.1145\/195058.195407"},{"key":"11_CR4","unstructured":"Carback, R., Chaum, D., Clark, J., Conway, J., Essex, A., Herrnson, P.S., Mayberry, T., Popoveniuc, S., Rivest, R.L., Shen, E., Sherman, A.T., Vora, P.L.: Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy. In: Proceedings of the 19th USENIX Security Symposium (2010)"},{"key":"11_CR5","unstructured":"Chaum, D.: Punchscan, \n                    \n                      http:\/\/www.punchscan.org\n                    \n                    \n                   (viewed on November 12, 2010)"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TIFS.2009.2034919","volume":"4","author":"D. Chaum","year":"2009","unstructured":"Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T., Vora, P.L.: Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Transactions on Information Forensics and Security\u00a04(4), 611\u2013627 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR8","unstructured":"Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Boneh, D. (ed.) USENIX Security Symposium, pp. 339\u2013353. USENIX (2002)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Atluri, V., et al. (eds.) WPES, pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-27809-2_9","volume-title":"Financial Cryptography","author":"A. Kiayias","year":"2004","unstructured":"Kiayias, A., Yung, M.: The Vector-Ballot e-Voting Approach. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 72\u201389. Springer, Heidelberg (2004)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-12980-3_9","volume-title":"Towards Trustworthy Elections","author":"A. Kiayias","year":"2010","unstructured":"Kiayias, A., Yung, M.: The Vector-Ballot Approach for Online Voting Procedures. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 155\u2013174. Springer, Heidelberg (2010)"},{"key":"11_CR12","unstructured":"mfoster.com. 2008 Presidential Election Write-In Rules, \n                    \n                      mfoster.com\/misc\/write-in_rules_2008.html\n                    \n                    \n                   (viewed on November 15, 2010)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11818175_22","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"T. Moran","year":"2006","unstructured":"Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 373\u2013392. Springer, Heidelberg (2006)"},{"key":"11_CR14","unstructured":"Neff, A.D.: Verifiable mixing (shuffling) of ElGamal pairs (2004), \n                    \n                      http:\/\/web.archive.org\/web\/20041212174250\/www.votehere.net\/documents.html\n                    \n                    \n                   (last accessed March 1, 2011)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Andrew Neff, C.: A verifiable secret shuffle and its application to e-voting. In: ACM Conference on Computer and Communications Security, pp. 116\u2013125 (2001)","DOI":"10.1145\/501983.502000"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BFb0028157","volume-title":"Security Protocols","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 25\u201335. Springer, Heidelberg (1998)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-48285-7_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"C. Park","year":"1994","unstructured":"Park, C., Itoh, K., Kurosawa, K.: Efficient Anonymous Channel and All\/Nothing Election Scheme. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 248\u2013259. Springer, Heidelberg (1994)"},{"key":"11_CR19","unstructured":"Ryan, P.Y.A.: Pr\u00eat \u00e0 Voter with Paillier encryption. Technical Report CS-TR-965, University of Newcastle (2006)"},{"issue":"4","key":"11_CR20","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2009.2033233","volume":"4","author":"P.Y.A. Ryan","year":"2009","unstructured":"Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Pr\u00eat \u00e0 Voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security\u00a04(4), 662\u2013673 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/11863908_20","volume-title":"Computer Security \u2013 ESORICS 2006","author":"P.Y.A. Ryan","year":"2006","unstructured":"Ryan, P.Y.A., Schneider, S.A.: Pr\u00eat \u00e0 Voter with Re-encryption Mixes. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 313\u2013326. Springer, Heidelberg (2006)"},{"key":"11_CR22","unstructured":"Ryan, P.Y.A., Teague, V.: Ballot permutations in Pr\u00eat \u00e0 Voter. In: USENIX\/ACCURATE Electronic Voting Technology Workshop (2009)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-49264-X_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"K. Sako","year":"1995","unstructured":"Sako, K., Kilian, J.: Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 393\u2013403. Springer, Heidelberg (1995)"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-17401-8_8","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"Z. Xia","year":"2010","unstructured":"Xia, Z., Culnane, C., Heather, J., Jonker, H., Ryan, P.Y.A., Schneider, S., Srinivasan, S.: Versatile Pr\u00eat \u00e0 Voter: Handling Multiple Election Methods with a Unified Interface. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 98\u2013114. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32747-6_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:14:42Z","timestamp":1620130482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32747-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642327469","9783642327476"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32747-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}