{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:02:17Z","timestamp":1743134537629,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811958670"},{"type":"electronic","value":"9789811958687"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-19-5868-7_58","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T07:49:15Z","timestamp":1672559355000},"page":"781-794","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Preliminary Conceptions of a Remote Incoercible E-Voting Scheme"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0265-4986","authenticated-orcid":false,"given":"Nazia Jahan Khan","family":"Chowdhury","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6082-0666","authenticated-orcid":false,"given":"Shinsuke","family":"Tamura","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4895-7234","authenticated-orcid":false,"given":"Kazi Md. Rokibul","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"issue":"2","key":"58_CR1","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.cose.2005.11.003","volume":"25","author":"K Sampigethaya","year":"2006","unstructured":"Sampigethaya K, Poovendran R (2006) A framework and taxonomy for comparison of electronic voting schemes. Comput Secur 25(2):137\u2013153","journal-title":"Comput Secur"},{"key":"58_CR2","unstructured":"Tamura S (2018) A scheme for self-issuable e-cash systems. LAMBERT (2018)"},{"issue":"2","key":"58_CR3","first-page":"32","volume":"3","author":"S Tamura","year":"2015","unstructured":"Tamura S et al (2015) An incoercible E-voting scheme based on revised simplified verifiable re-encryption mix-nets. Inf Secur Comput Fraud 3(2):32\u201338","journal-title":"Inf Secur Comput Fraud"},{"issue":"11","key":"58_CR4","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1541\/ieejeiss.130.2065","volume":"130","author":"KMR Alam","year":"2010","unstructured":"Alam KMR, Tamura S, Taniguchi S, Yanase T (2010) An anonymous voting scheme based on confirmation numbers. IEEJ Trans EIS 130(11):2065\u20132073","journal-title":"IEEJ Trans EIS"},{"issue":"3","key":"58_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10207-019-00457-8","volume":"19","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Liu Y, Jiang C, Wang S (2020) An improved FOO voting scheme using blockchain. Int J Inf Secur 19(3):303\u2013310","journal-title":"Int J Inf Secur"},{"key":"58_CR6","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/j.future.2019.10.016","volume":"111","author":"X Fan","year":"2020","unstructured":"Fan X, Wu T, Zheng Q, Chen Y, Alam M, Xiao X (2020) HSE-Voting: a secure high-efficiency electronic voting scheme based on homomorphic signcryption. Futur Gener Comput Syst 111:754\u2013762","journal-title":"Futur Gener Comput Syst"},{"key":"58_CR7","doi-asserted-by":"crossref","unstructured":"Moran T, Naor M (2010) Split-ballot voting: Everlasting privacy with distributed trust. ACM Trans Information Syst Secur 13(2):1\u201343","DOI":"10.1145\/1698750.1698756"},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"Ryan P, R\u00f8nne PB et al (2016) Selene: voting with transparent verifiability and coercion-mitigation. In: International Conference on F. cryptography and data security, pp 176\u2013192","DOI":"10.1007\/978-3-662-53357-4_12"},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Alam KMR, Tamura S et al (2021) An electronic voting scheme based on revised-SVRM and confirmation numbers. IEEE Trans Dependable Secure Comput 18(1):400\u2013410","DOI":"10.1109\/TDSC.2019.2892465"},{"key":"58_CR10","doi-asserted-by":"crossref","unstructured":"Araujo R et al (2016) Remote electronic voting can be efficient, verifiable and coercion-resistant. In: International conference on F. cryptography and data security, pp 224\u2013232","DOI":"10.1007\/978-3-662-53357-4_15"},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"R\u00f8nne PB et al (2019) Coercion-resistant voting in linear via fully homomorphic encryption: towards a quantum-safe scheme. arXiv preprint arXiv:1901.02560","DOI":"10.1007\/978-3-030-43725-1_20"},{"key":"58_CR12","doi-asserted-by":"crossref","unstructured":"Juels A, Catalano D, Jakobsson M (2005) Coercion-resistant electronic elections. In: Proceding of the 2005 ACM workshop on privacy in the electronic society, pp 61\u201370","DOI":"10.1145\/1102199.1102213"},{"key":"58_CR13","unstructured":"Demirel D, Graff JVD (2012) A publicly-verifiable mix-net with everlasting privacy towards observers. In: Proceeding of IACR cryptology ePrint archive"},{"key":"58_CR14","doi-asserted-by":"crossref","unstructured":"Bayer S, Groth J (2012) Efficient zero-knowledge argument for correctness of a shuffle. Adv Cryptol - EUROCRYPT, pp 263\u2013280","DOI":"10.1007\/978-3-642-29011-4_17"},{"issue":"1","key":"58_CR15","first-page":"10","volume":"2","author":"S Tamura","year":"2014","unstructured":"Tamura S, Taniguchi S (2014) Enhancement of anonymous tag based credentials. Inform Secur Comput Fraud 2(1):10\u201320","journal-title":"Inform Secur Comput Fraud"}],"container-title":["Lecture Notes in Electrical Engineering","Machine Learning, Image Processing, Network Security and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-5868-7_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T08:52:49Z","timestamp":1672563169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-5868-7_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789811958670","9789811958687"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-5868-7_58","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}