{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:07:50Z","timestamp":1761808070374},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662533567"},{"type":"electronic","value":"9783662533574"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_16","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T09:22:01Z","timestamp":1472548921000},"page":"233-250","source":"Crossref","is-referenced-by-count":9,"title":["Universal Cast-as-Intended Verifiability"],"prefix":"10.1007","author":[{"given":"Alex","family":"Escala","sequence":"first","affiliation":[]},{"given":"Sandra","family":"Guasch","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Herranz","sequence":"additional","affiliation":[]},{"given":"Paz","family":"Morillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"16_CR1","first-page":"335","volume-title":"USENIX Security Symposium","author":"B Adida","year":"2008","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 335\u2013348. USENIX Association, Berkeley (2008)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Adida, B., Rivest, R.L.: Scratch and vote: self-contained paper-based cryptographic voting. In: Juels, A., Winslett, M. (eds.) ACM Workshop on Privacy in the Electronic Society, WPES 2006, pp. 29\u201340. ACM (2006)","DOI":"10.1145\/1179601.1179607"},{"key":"16_CR3","unstructured":"Benaloh, J.: Simple verifiable elections. In: Electronic Voting Technology Workshop, EVT 2006, p. 5. USENIX Association, Berkeley (2006)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Bernhard, D., Cortier, V., Galindo, D., Pereira, O., Warinschi, B.: SoK: a comprehensive analysis of game-based ballot privacy definitions. In: IEEE Symposium on Security and Privacy, SP 2015, pp. 499\u2013516. IEEE Computer Society (2015)","DOI":"10.1109\/SP.2015.37"},{"key":"16_CR5","unstructured":"Bernhard, D., Pereira, O., Warinschi, B.: IACR Cryptology ePrint Archive"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-77493-8_10","volume-title":"E-Voting and Identity","author":"J-M Bohli","year":"2007","unstructured":"Bohli, J.-M., M\u00fcller-Quade, J., R\u00f6hrich, S.: Bingo voting: secure and coercion-free voting using a trusted random number generator. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896, pp. 111\u2013124. Springer, Heidelberg (2007)"},{"key":"16_CR7","unstructured":"Chaum, D.: Physical and digital secret ballot systems, WO Patent App. PCT\/US2001\/002,883, 2 August 2001"},{"issue":"1","key":"16_CR8","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D Chaum","year":"2004","unstructured":"Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Secur. Privac. 2(1), 38\u201347 (2004)","journal-title":"IEEE Secur. Privac."},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO 1992","author":"D Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO 1994","author":"R Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I.B., Schoenmakers, B.: Proof of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT 1997","author":"R Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/3-540-48969-X_3","volume-title":"Lectures on Data Security: Modern Cryptology in Theory and Practice","author":"IB Damg\u00e5rd","year":"1999","unstructured":"Damg\u00e5rd, I.B.: Commitment schemes and zero-knowledge protocols. In: Damg\u00e5rd, I.B. (ed.) EEF School 1998. LNCS, vol. 1561, pp. 63\u201386. Springer, Heidelberg (1999)"},{"key":"16_CR13","unstructured":"Essex, A., Clark, J., Hengartner, U., Adams, C.: Eperio: mitigating technical complexity in cryptographic election verification. IACR Cryptology ePrint Archive 2012, 178 (2012)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: 22nd Annual ACM Symposium on Theory of Computing, STOC 1990, pp. 416\u2013426. ACM Press (1990)","DOI":"10.1145\/100216.100272"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","first-page":"234","volume-title":"Financial Cryptography","author":"E Gerck","year":"2002","unstructured":"Gerck, E., Neff, C.A., Rivest, R.L., Rubin, A.D., Yung, M.: The business of electronic voting. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 234\u2013259. Springer, Heidelberg (2002)"},{"key":"16_CR16","unstructured":"Gharadaghy, R., Volkamer, M.: Verifiability in electronic voting - explanations for non security experts. In: Krimmer, R., Grimm, R. (eds.) Electronic Voting. LNI, vol. 167, pp. 151\u2013162. GI (2010)"},{"issue":"3","key":"16_CR17","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/s00145-013-9152-y","volume":"27","author":"J Groth","year":"2014","unstructured":"Groth, J., Ostrovsky, R.: Cryptography in the multi-string model. J. Cryptol. 27(3), 506\u2013543 (2014)","journal-title":"J. Cryptol."},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-642-04135-8_7","volume-title":"E-Voting and Identity","author":"R Joaquim","year":"2009","unstructured":"Joaquim, R., Ribeiro, C., Ferreira, P.: VeryVote: a voter verifiable code voting system. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) VOTE-ID 2009. LNCS, vol. 5767, pp. 106\u2013121. Springer, Heidelberg (2009)"},{"key":"16_CR19","unstructured":"Neff, C.A.: Practical high certainty intent verification for encrypted votes (2004)"},{"issue":"4","key":"16_CR20","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/TIFS.2009.2033233","volume":"4","author":"PYA Ryan","year":"2009","unstructured":"Ryan, P.Y.A., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Pr\u00eat \u00e0 voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4(4), 662\u2013673 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-642-36213-2_15","volume-title":"Security Protocols XVII","author":"PYA Ryan","year":"2013","unstructured":"Ryan, P.Y.A., Teague, V.: Pretty good democracy. In: Christianson, B., Malcolm, J.A., Maty\u00e1\u0161, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 111\u2013130. Springer, Heidelberg (2013)"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-49264-X_32","volume-title":"Advances in Cryptology - EUROCRYPT 1995","author":"K Sako","year":"1995","unstructured":"Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393\u2013403. Springer, Heidelberg (1995)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Santis, A.D., Persiano, G.: Zero-knowledge proofs of knowledge without interaction (extended abstract). In: FOCS, pp. 427\u2013436. IEEE Computer Society (1992)","DOI":"10.1007\/3-540-55210-3_204"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/3-540-44448-3_7","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"C-P Schnorr","year":"2000","unstructured":"Schnorr, C.-P., Jakobsson, M.: Security of signed elgamal encryption. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 73\u201389. Springer, Heidelberg (2000)"},{"issue":"11","key":"16_CR25","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T22:23:05Z","timestamp":1568326985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}