{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:35:07Z","timestamp":1743060907604,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609567"},{"type":"electronic","value":"9789819609574"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_18","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:33:51Z","timestamp":1738272831000},"page":"288-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A2V: Anonymous and\u00a0Accountable Voting Framework via\u00a0Blockchain"],"prefix":"10.1007","author":[{"given":"Zhimei","family":"Sui","sequence":"first","affiliation":[]},{"given":"Liangrong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"unstructured":"Ethereum. https:\/\/ethereum.org\/en\/","key":"18_CR1"},{"unstructured":"Analysis of an electronic voting system. In: 2004 Proceedings of the IEEE Symposium on Security and Privacy, pp. 27\u201340. IEEE (2004)","key":"18_CR2"},{"doi-asserted-by":"crossref","unstructured":"Beimel, A.: Secret-sharing schemes: a survey. In: International Conference on Coding and Cryptology, pp. 11\u201346. Springer (2011)","key":"18_CR3","DOI":"10.1007\/978-3-642-20901-7_2"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Advances in Cryptology-EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, 14\u201318 May 2000, pp. 259\u2013274. Springer (2000)","key":"18_CR4","DOI":"10.1007\/3-540-45539-6_18"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"70746","DOI":"10.1109\/ACCESS.2022.3187688","volume":"10","author":"A Benabdallah","year":"2022","unstructured":"Benabdallah, A., Audras, A., Coudert, L., El Madhoun, N., Badra, M.: Analysis of blockchain solutions for e-voting: a systematic literature review. IEEE Access 10, 70746\u201370759 (2022)","journal-title":"IEEE Access"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"100608","DOI":"10.1016\/j.cosrev.2023.100608","volume":"51","author":"AK Chattopadhyay","year":"2024","unstructured":"Chattopadhyay, A.K., Saha, S., Nag, A., Nandi, S.: Secret sharing: a comprehensive survey, taxonomy and applications. Comput. Sci. Rev. 51, 100608 (2024)","journal-title":"Comput. Sci. Rev."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-030-39303-8_13","volume-title":"Information Security Applications","author":"G Choi","year":"2020","unstructured":"Choi, G., Vaudenay, S.: Timed-release encryption with master time bound key. In: You, I. (ed.) Information Security Applications, pp. 167\u2013179. Springer, Cham (2020)"},{"unstructured":"Dujmovic, J., Garg, R., Malavolta, G.: Time-lock puzzles with efficient batch solving. Cryptology ePrint Archive, Paper 2023\/1582 (2023). https:\/\/eprint.iacr.org\/2023\/1582","key":"18_CR8"},{"issue":"6","key":"18_CR9","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"DA Gritzalis","year":"2002","unstructured":"Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539\u2013556 (2002)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Hanifatunnisa, R., Rahardjo, B.: Blockchain based e-voting recording system design. In: 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA), pp.\u00a01\u20136. IEEE (2017)","key":"18_CR10","DOI":"10.1109\/TSSA.2017.8272896"},{"doi-asserted-by":"crossref","unstructured":"Hj\u00e1lmarsson, F.\u00de., Hrei\u00f0arsson, G.K., Hamdaqa, M., Hj\u00e1lmt\u1ef3sson, G.: Blockchain-based e-voting system. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 983\u2013986. IEEE (2018)","key":"18_CR11","DOI":"10.1109\/CLOUD.2018.00151"},{"issue":"17","key":"18_CR12","doi-asserted-by":"publisher","first-page":"5874","DOI":"10.3390\/s21175874","volume":"21","author":"U Jafar","year":"2021","unstructured":"Jafar, U., Aziz, M.J.A., Shukur, Z.: Blockchain for electronic voting system-review and open research challenges. Sensors 21(17), 5874 (2021)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Katz, J.: Digital Signatures, vol.\u00a01. Springer, Heidelberg (2010)","key":"18_CR13","DOI":"10.1007\/978-0-387-27712-7"},{"doi-asserted-by":"crossref","unstructured":"Kiayias, A., Korman, M., Walluck, D.: An internet voting system supporting user privacy. In: 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 165\u2013174. IEEE (2006)","key":"18_CR14","DOI":"10.1109\/ACSAC.2006.12"},{"issue":"5","key":"18_CR15","first-page":"1825","volume":"3","author":"S Kumar","year":"2011","unstructured":"Kumar, S., Walia, E.: Analysis of electronic voting system in various countries. Int. J. Comput. Sci. Eng. 3(5), 1825\u20131830 (2011)","journal-title":"Int. J. Comput. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Mookherji, S., Vanga, O., Prasath, R.: Blockchain-based e-voting protocols. In: Blockchain Technology for Emerging Applications, pp. 239\u2013266. Elsevier (2022)","key":"18_CR16","DOI":"10.1016\/B978-0-323-90193-2.00006-5"},{"unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)","key":"18_CR17"},{"issue":"2","key":"18_CR18","first-page":"91","volume":"3","author":"G Ofori-Dwumfuo","year":"2011","unstructured":"Ofori-Dwumfuo, G., Paatey, E.: The design of an electronic voting system. Res. J. Inf. Technol. 3(2), 91\u201398 (2011)","journal-title":"Res. J. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Pandey, A., Bhasi, M., Chandrasekaran, K.: VoteChain: a blockchain based e-voting system. In: 2019 Global Conference for Advancement in Technology (GCAT), pp.\u00a01\u20134. IEEE (2019)","key":"18_CR19","DOI":"10.1109\/GCAT47503.2019.8978295"},{"issue":"4","key":"18_CR20","doi-asserted-by":"publisher","first-page":"102595","DOI":"10.1016\/j.ipm.2021.102595","volume":"58","author":"M Pawlak","year":"2021","unstructured":"Pawlak, M., Poniszewska-Mara\u0144da, A.: Trends in blockchain-based electronic voting systems. Inf. Process. Manage. 58(4), 102595 (2021)","journal-title":"Inf. Process. Manage."},{"unstructured":"PUB, F.: Digital signature standard (DSS). Fips pub, pp. 186\u2013192 (2000)","key":"18_CR21"},{"doi-asserted-by":"publisher","unstructured":"Sallal, M., de\u00a0Fr\u00e9in, R., Malik, A.: PVPBC: privacy and verifiability preserving e-voting based on permissioned blockchain. Future Internet 15(4) (2023). https:\/\/doi.org\/10.3390\/fi15040121, https:\/\/www.mdpi.com\/1999-5903\/15\/4\/121","key":"18_CR22","DOI":"10.3390\/fi15040121"},{"issue":"11","key":"18_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"unstructured":"Shoup, V.: A proposal for an ISO standard for public key encryption. Cryptology ePrint Archive (2001)","key":"18_CR24"},{"unstructured":"Taban, H., Konde, S., Sebwato, N.: Design and implementation of electronic voting system (2017)","key":"18_CR25"},{"issue":"8","key":"18_CR26","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.3390\/sym12081328","volume":"12","author":"R Ta\u015f","year":"2020","unstructured":"Ta\u015f, R., Tanr\u0131\u00f6ver, \u00d6.\u00d6.: A systematic review of challenges and opportunities of blockchain for e-voting. Symmetry 12(8), 1328 (2020)","journal-title":"Symmetry"},{"issue":"2","key":"18_CR27","first-page":"483","volume":"151","author":"CC Yang","year":"2004","unstructured":"Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483\u2013490 (2004)","journal-title":"Appl. Math. Comput."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:03Z","timestamp":1738272843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}