{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:42:34Z","timestamp":1725864154227},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662533567"},{"type":"electronic","value":"9783662533574"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_14","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T09:22:01Z","timestamp":1472548921000},"page":"209-223","source":"Crossref","is-referenced-by-count":2,"title":["Efficiency Comparison of Various Approaches in E-Voting Protocols"],"prefix":"10.1007","author":[{"given":"Oksana","family":"Kulyk","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"14_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. USENIX Security Symposium, vol. 17, pp. 335\u2013348 (2008)"},{"key":"14_CR2","unstructured":"Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.J., et al.: Electing a university president using open-audit voting: analysis of real-world use of Helios. EVT\/WOTE 2009, pp. 10\u201310 (2009)"},{"key":"14_CR3","unstructured":"Burton, C., Culnane, C., Schneider, S.: Secure and verifiable electronic voting in practice: the use of vvote in the victorian state election. arXiv preprint http:\/\/arXiv.org\/abs\/1504.07098 (2015)"},{"key":"14_CR4","unstructured":"Committee, E.N.E.: Riigikogu elections 2011 - Riigikogu (parliament) elections - past elections - estonian national electoral committee. (2011). http:\/\/www.vvk.ee\/past-elections\/riigikogu-parliament-elections\/riigikogu-elections-2011\/ . Accessed 2 Mar 2015"},{"key":"14_CR5","unstructured":"Committee, E.N.E.: Statistics - internet voting - voting methods in estonia - estonian national electoral committee (2015). http:\/\/www.vvk.ee\/voting-methods-in-estonia\/engindex\/statistics . Accessed 2 Mar 2015"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Culnane, C., Ryan, P.Y., Schneider, S., Teague, V.: Vvote: a verifiable voting system. arXiv preprint arXiv:1404.6822 (2014)","DOI":"10.1145\/2746338"},{"key":"14_CR7","unstructured":"Dubuis, E., Fischli, S., Haenni, R., Hauser, S., Koenig, R.E., Locher, P., Ritter, J., von Bergen, P.: Verifizierbare internet-wahlen an schweizer hochschulen mit univote. In: GI-Jahrestagung, pp. 767\u2013788. Citeseer (2013)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-32747-6_1","volume-title":"E-Voting and Identity","author":"K Gj\u00f8steen","year":"2012","unstructured":"Gj\u00f8steen, K.: The Norwegian internet voting protocol. In: Kiayias, A., Lipmaa, H. (eds.) VoteID 2011. LNCS, vol. 7187, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/11496137_32","volume-title":"Applied Cryptography and Network Security","author":"J Groth","year":"2005","unstructured":"Groth, J.: Non-interactive zero-knowledge arguments for voting. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 467\u2013482. Springer, Heidelberg (2005)"},{"issue":"2","key":"14_CR10","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1049\/iet-ifs.2008.0127","volume":"4","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.Y., Zieli\u0144ski, P.: Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2), 62\u201367 (2010)","journal-title":"IET Inf. Secur."},{"key":"14_CR11","unstructured":"Helios: Helios v4 (2012). http:\/\/documentation.heliosvoting.org\/verification-specs\/helios-v4 . Accessed 2 Mar 2015"},{"key":"14_CR12","unstructured":"IACR: IACR Election 2012 (2012). http:\/\/www.iacr.org\/elections\/2012\/ . Accessed 2 Mar 2015"},{"issue":"2","key":"14_CR13","first-page":"130","volume":"19","author":"R Joaquim","year":"2014","unstructured":"Joaquim, R.: How to prove the validity of a complex ballot encryption to the voter and the public. J. Inf. Secur. Appl. 19(2), 130\u2013142 (2014)","journal-title":"J. Inf. Secur. Appl."},{"key":"14_CR14","unstructured":"i Esteve, J.B., Goldsmith, B., Turner, J.: Norwegian E-vote Project - Speed and Efficiency of the Vote Counting Process (2012). https:\/\/www.regjeringen.no\/globalassets\/upload\/krd\/prosjekter\/e-valg\/evaluering\/topic4_assessment.pdf . Accessed 2 Mar 2015"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/3-540-45664-3_10","volume-title":"Public Key Cryptography","author":"A Kiayias","year":"2002","unstructured":"Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 141\u2013158. Springer, Heidelberg (2002)"},{"key":"14_CR16","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"14_CR17","unstructured":"Organization for Security, Co-operation in Europe,: Switzerland, Federal Elections, 23 October 2011: Final report (2015). http:\/\/www.osce.org\/odihr\/87417 . Accessed 30 Oct 2015"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Pedersen, T.P.: Distributed provers and verifiable secret sharing based on the discrete logarithm problem. DAIMI Rep. Ser. 21(388) (1992)","DOI":"10.7146\/dpb.v21i388.6621"},{"key":"14_CR19","unstructured":"Bundeskanzlei, S.: Vote \u00e9lectronique - Versuch\u00fcbersicht (2015). https:\/\/www.bk.admin.ch\/themen\/pore\/evoting\/08004\/index.html?lang=de . Accessed 30 Oct 2015"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/978-3-642-12678-9_7","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"B Terelius","year":"2010","unstructured":"Terelius, B., Wikstr\u00f6m, D.: Proofs of restricted shuffles. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 100\u2013113. Springer, Heidelberg (2010)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Budurushi, J., Demirel, D.: Vote casting device with VV-SV-PAT for elections with complicated ballot papers. In: 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/REVOTE.2011.6045910"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-642-02620-1_28","volume-title":"Information Security and Privacy","author":"D Wikstr\u00f6m","year":"2009","unstructured":"Wikstr\u00f6m, D.: A commitment-consistent proof of a shuffle. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 407\u2013421. Springer, Heidelberg (2009)"},{"key":"14_CR23","unstructured":"Wikstr\u00f6m, D.: How to implement a stand-alone verifier for the verificatum mix-net (2011)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T22:23:05Z","timestamp":1568326985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}