{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:23:49Z","timestamp":1743114229641,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756087"},{"type":"electronic","value":"9789819756094"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5609-4_14","type":"book-chapter","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T12:02:04Z","timestamp":1722340924000},"page":"181-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Voting Scheme Based on Quantum Walk"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5536-7059","authenticated-orcid":false,"given":"Bai","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8844-925X","authenticated-orcid":false,"given":"Kuikui","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8156-0068","authenticated-orcid":false,"given":"Pengda","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1020-815X","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"issue":"11","key":"14_CR1","first-page":"3378","volume":"37","author":"J Zheng","year":"2020","unstructured":"Zheng, J., Lai, H.C.: Blockchain e-voting scheme based on one-time ring signature. Appl. Res. Comput. 37(11), 3378\u20133381+3391 (2020)","journal-title":"Appl. Res. Comput."},{"issue":"4","key":"14_CR2","doi-asserted-by":"publisher","first-page":"2399","DOI":"10.1007\/s12083-020-00977-4","volume":"14","author":"A Shankar","year":"2021","unstructured":"Shankar, A., Pandiaraja, P., Sumathi, K., Stephan, T., Sharma, P.: Privacy preserving E-voting cloud system based on ID based encryption. Peer-to-Peer Netw. Appl. 14(4), 2399\u20132409 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"10","key":"14_CR3","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10773-022-05237-0","volume":"61","author":"F Musanna","year":"2022","unstructured":"Musanna, F., Kumar, S.: Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy with simulation analysis. Int. J. Theor. Phys. 61(10), 255 (2022)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"14_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10773-022-05036-7","volume":"61","author":"X Chen","year":"2022","unstructured":"Chen, X., Lou, X.: An efficient verifiable quantum secret sharing scheme via quantum walk teleportation. Int. J. Theor. Phys. 61(4), 61\u201399 (2022)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"14_CR5","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/s41598-024-51212-6","volume":"14","author":"B Ahn","year":"2024","unstructured":"Ahn, B., Park, J., Lee, J., Lee, S.: High-dimensional single photon based quantum secure direct communication using time and phase mode degrees. Sci. Rep. 14(1), 888 (2024)","journal-title":"Sci. Rep."},{"issue":"11","key":"14_CR6","first-page":"5376","volume":"34","author":"WY Ke","year":"2023","unstructured":"Ke, W.Y., Shi, R.H.: Measurement-device-independent quantum voting scheme with identity authentication. J. Softw. 34(11), 5376\u20135391 (2023)","journal-title":"J. Softw."},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"72105","DOI":"10.1109\/ACCESS.2019.2919119","volume":"7","author":"RH Shi","year":"2019","unstructured":"Shi, R.H., Zhang, M.W.: A feasible quantum protocol for private set intersection cardinality. IEEE Access 7, 72105\u201372112 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"17332","DOI":"10.1038\/s41598-021-96770-1","volume":"11","author":"B Liu","year":"2021","unstructured":"Liu, B., Ruan, O., Shi, R.H., Zhang, M.W.: Quantum private set intersection cardinality based on bloom filter. Sci. Rep. 11(1), 17332 (2021)","journal-title":"Sci. Rep."},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1103\/PhysRevA.84.022331","volume":"84","author":"M Bonanome","year":"2011","unstructured":"Bonanome, M., Bu\u017eek, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 290\u2013296 (2011)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjd\/s10053-020-00014-2","volume":"75","author":"RH Shi","year":"2021","unstructured":"Shi, R.H., Qin, J.Q., Liu, B., Zhang, M.W.: Anonymous quantum voting protocol based on Chinese remainder theorem. Eur. Phys. J. D 75(1), 1\u20137 (2021)","journal-title":"Eur. Phys. J. D"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/11593447_12","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"M Christandl","year":"2005","unstructured":"Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 217\u2013235. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_12"},{"doi-asserted-by":"crossref","unstructured":"Hillery M.: Quantum voting and privacy protection: first steps. SPIE Newsroom 10(2.1200610), 0419 (2006)","key":"14_CR12","DOI":"10.1117\/2.1200610.0419"},{"issue":"8","key":"14_CR13","doi-asserted-by":"publisher","first-page":"2599","DOI":"10.1007\/s10773-020-04529-7","volume":"59","author":"J Wang","year":"2020","unstructured":"Wang, J., Xu, G.B., Jiang, D.H.: Quantum voting scheme with Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 59(8), 2599\u20132605 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"14_CR14","doi-asserted-by":"publisher","first-page":"4436","DOI":"10.1007\/s10773-016-3066-z","volume":"55","author":"M Naseri","year":"2016","unstructured":"Naseri, M., Gong, L.H., Houshmand, M., Matin, L.F.: An anonymous surveying protocol via Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 55(10), 4436\u20134444 (2016)","journal-title":"Int. J. Theor. Phys."},{"issue":"06","key":"14_CR15","first-page":"721","volume":"34","author":"XH Liu","year":"2017","unstructured":"Liu, X.H., Yun, X.J., Fan, X.C., Fang, J.B.: A secure quantum voting protocol based on four-particle GHZ-state. Chinese J. Quant. Electron. 34(06), 721\u2013726 (2017)","journal-title":"Chinese J. Quant. Electron."},{"issue":"3","key":"14_CR16","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s10773-019-04358-3","volume":"59","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Zhang, J.Z., Xie, S.C.: A secure quantum voting scheme based on quantum group blind signature. Int. J. Theor. Phys. 59(3), 719\u2013729 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.102.032211","volume":"102","author":"DH Jiang","year":"2020","unstructured":"Jiang, D.H., Xu, G.B.: Nonlocal sets of orthogonal product states in an arbitrary multipartite quantum system. Phys. Rev. A 102(3), 032211 (2020)","journal-title":"Phys. Rev. A"},{"doi-asserted-by":"crossref","unstructured":"Ambainis, A., Bach, E., Nayak, A., Vishwanath, A., Watrous, J.: One-dimensional quantum walks. In: Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing, pp. 37\u201349 (2001)","key":"14_CR18","DOI":"10.1145\/380752.380757"},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11128-022-03758-5","volume":"22","author":"J Joseph","year":"2022","unstructured":"Joseph, J., Ali, S.T.: Multiparty quantum private comparison based on quantum walks. Quant. Inf. Process. 22(1), 17\u201322 (2022)","journal-title":"Quant. Inf. Process."},{"issue":"7","key":"14_CR20","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1007\/s10773-020-04478-1","volume":"59","author":"XY Li","year":"2020","unstructured":"Li, X.Y., Chang, Y., Zhang, S.B., Dai, J.Q., Zheng, T.: Quantum blind signature scheme based on quantum walk. Int. J. Theor. Phys. 59(7), 2059\u20132073 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"14_CR21","doi-asserted-by":"publisher","first-page":"3019","DOI":"10.1007\/s10773-017-3468-6","volume":"56","author":"JL Zhang","year":"2017","unstructured":"Zhang, J.L., Xie, S.C., Zhang, J.Z.: An elaborate secure quantum voting scheme. Int. J. Theor. Phys. 56(10), 3019\u20133028 (2017)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"14_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s11128-022-03446-4","volume":"21","author":"JJ Chen","year":"2022","unstructured":"Chen, J.J., You, F.C., Li, Z.Z.: Quantum multi-proxy blind signature based on cluster state. Quant. Inf. Process. 21(3), 104 (2022)","journal-title":"Quant. Inf. Process."},{"issue":"9","key":"14_CR23","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s11128-017-1675-y","volume":"16","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Shang, Y., Xue, P.: Generalized teleportation by quantum walks. Quant. Inf. Process. 16(9), 221 (2017)","journal-title":"Quant. Inf. Process."},{"issue":"7","key":"14_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 1\u201312 (2019)","journal-title":"Sci. China Phys. Mech. Astron."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5609-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T12:05:57Z","timestamp":1722341157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5609-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756087","9789819756094"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5609-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}