{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:19:36Z","timestamp":1773879576378,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T00:00:00Z","timestamp":1567468800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T00:00:00Z","timestamp":1567468800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10207-019-00465-8","type":"journal-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T11:12:18Z","timestamp":1567509138000},"page":"323-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":77,"title":["Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability"],"prefix":"10.1007","volume":"19","author":[{"given":"Shufan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lili","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,3]]},"reference":[{"key":"465_CR1","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335\u2013348 (2008)"},{"key":"465_CR2","unstructured":"Agora: Bringing voting systems into the digital age. \n                  https:\/\/www.agora.vote\/\n                  \n                . Accessed 30 March 2019"},{"issue":"2","key":"465_CR3","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1080\/19331681.2018.1460288","volume":"15","author":"RM Alvarez","year":"2018","unstructured":"Alvarez, R.M., Levin, I., Li, Y.: Fraud, convenience, and e-voting: how voting experience shapes opinions about voting technology. J. Inf. Technol. Polit. 15(2), 94\u2013105 (2018)","journal-title":"J. Inf. Technol. Polit."},{"key":"465_CR4","doi-asserted-by":"crossref","unstructured":"Alves, J., Pinto, A.: On the use of the blockchain technology in electronic voting systems. In: International Symposium on Ambient Intelligence, pp. 323\u2013330. Springer, Berlin (2018)","DOI":"10.1007\/978-3-030-01746-0_38"},{"key":"465_CR5","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De\u00a0Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, p.\u00a030. ACM (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"465_CR6","unstructured":"Bajak, F.: Apnewsbreak: Georgia election server wiped after suit filed. \n                  https:\/\/apnews.com\/877ee1015f1c43f1965f63538b035d3f\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR7","doi-asserted-by":"crossref","unstructured":"Bartolucci, S., Bernat, P., Joseph, D.: Sharvot: secret share-based voting on the blockchain. In: Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 30\u201334. ACM (2018)","DOI":"10.1145\/3194113.3194118"},{"key":"465_CR8","doi-asserted-by":"crossref","unstructured":"Baudron, O., Fouque, P.A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, pp. 274\u2013283. ACM (2001)","DOI":"10.1145\/383962.384044"},{"key":"465_CR9","unstructured":"Benet, J.: IPFS-content addressed, versioned, P2P file system. arXiv preprint \n                  arXiv:1407.3561\n                  \n                 (2014)"},{"key":"465_CR10","doi-asserted-by":"crossref","unstructured":"Bentov, I., Kumaresan, R.: How to use Bitcoin to design fair protocols. In: Annual Cryptology Conference, pp. 421\u2013439. Springer, Berlin (2014)","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"465_CR11","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Mantilacci, M., Santancini, P., Santini, F.: An end-to-end voting-system based on Bitcoin. In: Proceedings of the Symposium on Applied Computing, pp. 1836\u20131841. ACM, New York (2017)","DOI":"10.1145\/3019612.3019841"},{"key":"465_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Efficient generation of shared RSA keys. In: Annual International Cryptology Conference, pp. 425\u2013439. Springer, Berlin (1997)","DOI":"10.1007\/BFb0052253"},{"key":"465_CR13","unstructured":"Bonneau, J., Clark, J., Goldfeder, S.: On Bitcoin as a public randomness source. IACR Cryptology ePrint Archive 2015, p. 1015 (2015)"},{"issue":"9","key":"465_CR14","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.14778\/3213880.3213884","volume":"11","author":"AD Breslow","year":"2018","unstructured":"Breslow, A.D., Jayasena, N.S.: Morton filters: faster, space-efficient cuckoo filters via biasing, compression, and decoupled logical sparsity. Proc. VLDB Endow. 11(9), 1041\u20131055 (2018)","journal-title":"Proc. VLDB Endow."},{"key":"465_CR15","unstructured":"Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016)"},{"key":"465_CR16","doi-asserted-by":"crossref","unstructured":"Chaieb, M., Yousfi, S., Lafourcade, P., Robbana, R.: Verify-your-vote: a verifiable blockchain-based online voting protocol. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, pp. 16\u201330. Springer, Berlin (2018)","DOI":"10.1007\/978-3-030-11395-7_2"},{"key":"465_CR17","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology, pp. 199\u2013203. Springer, Berlin (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"3","key":"465_CR18","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2008.70","volume":"6","author":"D Chaum","year":"2008","unstructured":"Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A., Vora, P.: Scantegrity: end-to-end voter-verifiable optical-scan voting. IEEE Secur. Priv. 6(3), 40\u201346 (2008)","journal-title":"IEEE Secur. Priv."},{"issue":"8","key":"465_CR19","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1007\/s12652-018-1029-3","volume":"10","author":"CM Chen","year":"2018","unstructured":"Chen, C.M., Wang, K.H., Yeh, K.H., Xiang, B., Wu, T.Y.: Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J. Ambient Intell. Human. Comput. 10(8), 3133\u20133142 (2018)","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"465_CR20","doi-asserted-by":"publisher","first-page":"12047","DOI":"10.1109\/ACCESS.2019.2891105","volume":"7","author":"CM Chen","year":"2019","unstructured":"Chen, C.M., Xiang, B., Liu, Y., Wang, K.H.: A secure authentication protocol for internet of vehicles. IEEE Access 7, 12047\u201312057 (2019)","journal-title":"IEEE Access"},{"key":"465_CR21","unstructured":"Chow, S.S., Liu, J.K., Wong, D.S.: Robust receipt-free election system with ballot secrecy and verifiability. In: NDSS, vol. 8, pp. 81\u201394 (2008)"},{"key":"465_CR22","doi-asserted-by":"crossref","unstructured":"Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., Sirer, E.G., et\u00a0al.: On scaling decentralized blockchains. In: International Conference on Financial Cryptography and Data Security, pp. 106\u2013125. Springer, Berlin (2016)","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"465_CR23","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 152\u2013165. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44987-6_10"},{"key":"465_CR24","unstructured":"DeMuro, J.: Here are the 10 sectors that blockchain will disrupt forever. \n                  https:\/\/www.techradar.com\/news\/here-are-the-10-sectors-that-blockchain-will-disrupt-forever\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR25","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The Sybil attack. In: International Workshop on Peer-to-Peer Systems, pp. 251\u2013260. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"465_CR26","unstructured":"EOSIO: EOS.IO technical white paper v2. \n                  https:\/\/github.com\/EOSIO\/Documentation\/blob\/master\/TechnicalWhitePaper.md\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR27","unstructured":"Ethereum: A next-generation smart contract and decentralized application platform. \n                  https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR28","doi-asserted-by":"crossref","unstructured":"Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 75\u201388. ACM, New York (2014)","DOI":"10.1145\/2674005.2674994"},{"issue":"3","key":"465_CR29","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. IEEE\/ACM Trans. Netw. 8(3), 281\u2013293 (2000)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"465_CR30","unstructured":"FollowMyVote: The online voting platform of the future. \n                  https:\/\/followmyvote.com\/\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR31","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: International Workshop on the Theory and Application of Cryptographic Techniques, pp. 244\u2013251. Springer, Berlin (1992)","DOI":"10.1007\/3-540-57220-1_66"},{"key":"465_CR32","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol: analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 281\u2013310. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"issue":"7\u20138","key":"465_CR33","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s12243-016-0525-8","volume":"71","author":"JP Gibson","year":"2016","unstructured":"Gibson, J.P., Krimmer, R., Teague, V., Pomares, J.: A review of e-voting: the past, present and future. Ann. Telecommun. 71(7\u20138), 279\u2013286 (2016)","journal-title":"Ann. Telecommun."},{"key":"465_CR34","unstructured":"Gramoli, V.: From blockchain consensus back to byzantine consensus. In: Future Generation Computer Systems (2017)"},{"issue":"2","key":"465_CR35","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1049\/iet-ifs.2008.0127","volume":"4","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.Y., Zieli\u0144ski, P.: Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2), 62\u201367 (2010)","journal-title":"IET Inf. Secur."},{"key":"465_CR36","unstructured":"Heiberg, S., Kubjas, I., Siim, J., Willemson, J.: On trade-offs of applying block chains for electronic voting bulletin boards. In: E-Vote-ID 2018, p. 259 (2018)"},{"issue":"3","key":"465_CR37","doi-asserted-by":"publisher","first-page":"5618","DOI":"10.1109\/JIOT.2019.2904177","volume":"6","author":"Q Jiang","year":"2019","unstructured":"Jiang, Q., Huang, X., Zhang, N., Zhang, K., Ma, X., Ma, J.: Shake to communicate: secure handshake acceleration-based pairing mechanism for wrist worn devices. IEEE Internet Things J. 6(3), 5618\u20135630 (2019)","journal-title":"IEEE Internet Things J."},{"key":"465_CR38","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583\u2013598. IEEE (2018)","DOI":"10.1109\/SP.2018.000-5"},{"issue":"4","key":"465_CR39","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MS.2018.2801546","volume":"35","author":"N Kshetri","year":"2018","unstructured":"Kshetri, N., Voas, J.: Blockchain-enabled e-voting. IEEE Softw. 35(4), 95\u201399 (2018)","journal-title":"IEEE Softw."},{"key":"465_CR40","unstructured":"Ltd., O.: Oraclize documentation. \n                  https:\/\/docs.oraclize.it\/\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR41","doi-asserted-by":"crossref","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: International Conference on Financial Cryptography and Data Security, pp. 357\u2013375. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-70972-7_20"},{"issue":"1","key":"465_CR42","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/602421.602436","volume":"46","author":"RT Mercuri","year":"2003","unstructured":"Mercuri, R.T.: On auditing audit trails. Commun. ACM 46(1), 17\u201320 (2003)","journal-title":"Commun. ACM"},{"key":"465_CR43","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: 1980 IEEE Symposium on Security and Privacy, pp. 122\u2013122. IEEE (1980)","DOI":"10.1109\/SP.1980.10006"},{"issue":"5","key":"465_CR44","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TNET.2002.803864","volume":"10","author":"M Mitzenmacher","year":"2002","unstructured":"Mitzenmacher, M.: Compressed bloom filters. IEEE\/ACM Trans. Netw. 10(5), 604\u2013612 (2002)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"465_CR45","doi-asserted-by":"crossref","unstructured":"Nishide, T., Sakurai, K.: Distributed Paillier cryptosystem without trusted dealer. In: International Workshop on Information Security Applications. pp. 44\u201360. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-17955-6_4"},{"key":"465_CR46","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Annual International Cryptology Conference, pp. 31\u201353. Springer, Berlin (1992)","DOI":"10.1007\/3-540-48071-4_3"},{"key":"465_CR47","doi-asserted-by":"crossref","unstructured":"Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: International Workshop on Security Protocols, pp. 25\u201335. Springer, Berlin (1997)","DOI":"10.1007\/BFb0028157"},{"key":"465_CR48","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"1\u20132","key":"465_CR49","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11127-017-0407-2","volume":"172","author":"S Park","year":"2017","unstructured":"Park, S., Rivest, R.L.: Towards secure quadratic voting. Public Choice 172(1\u20132), 151\u2013175 (2017)","journal-title":"Public Choice"},{"key":"465_CR50","doi-asserted-by":"crossref","unstructured":"Pawlak, M., Guziur, J., Poniszewska-Mara\u0144da, A.: Voting process with blockchain technology: auditable blockchain voting system. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 233\u2013244. Springer, Berlin (2018)","DOI":"10.1007\/978-3-319-98557-2_21"},{"key":"465_CR51","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.csi.2016.11.012","volume":"54","author":"Z Qin","year":"2017","unstructured":"Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H., Qin, Z.: A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput. Stand. Interfaces 54, 55\u201360 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"465_CR52","unstructured":"RANDAO: RANDAO: a DAO working as RNG of Ethereum. \n                  https:\/\/github.com\/randao\/randao\/blob\/master\/README.md\n                  \n                . Accessed 30 March 2019"},{"issue":"4","key":"465_CR53","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2009.2033233","volume":"4","author":"PY Ryan","year":"2009","unstructured":"Ryan, P.Y., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Pr\u00eat \u00e0 voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensics Secur. 4(4), 662\u2013673 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"465_CR54","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"465_CR55","unstructured":"Scott, D.: North Carolina elections board orders new house election after ballot tampering scandal. \n                  https:\/\/www.vox.com\/policy-and-politics\/2019\/2\/21\/18231981\/north-carolina-election-fraud-new-nc-9-election\n                  \n                . Accessed 30 March 2019"},{"key":"465_CR56","unstructured":"Takabatake, Y., Kotani, D., Okabe, Y.: An anonymous distributed electronic voting system using Zerocoin (2016)"},{"key":"465_CR57","doi-asserted-by":"crossref","unstructured":"Tian, H., Fu, L., He, J.: A simpler Bitcoin voting protocol. In: International Conference on Information Security and Cryptology, pp. 81\u201398. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-75160-3_7"},{"key":"465_CR58","unstructured":"TIVI: TIVI powered by smartmatic and cybernetica\u2014tivi.io. \n                  https:\/\/tivi.io\/\n                  \n                . Accessed 30 March 2019"},{"issue":"1","key":"465_CR59","first-page":"31","volume":"1","author":"KH Wang","year":"2017","unstructured":"Wang, K.H., Mondal, S.K., Chan, K., Xie, X.: A review of contemporary e-voting: requirements, technology, systems and usability. Data Sci. Pattern Recogn. 1(1), 31\u201347 (2017)","journal-title":"Data Sci. Pattern Recogn."},{"issue":"12","key":"465_CR60","doi-asserted-by":"publisher","first-page":"2327","DOI":"10.1109\/TIFS.2014.2363553","volume":"9","author":"H Xiong","year":"2014","unstructured":"Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12), 2327\u20132339 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"465_CR61","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","volume":"10","author":"H Xiong","year":"2015","unstructured":"Xiong, H., Qin, Z.: Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans. Inf. Forensics Secur. 10(7), 1442\u20131455 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"465_CR62","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2890126","author":"H Xiong","year":"2018","unstructured":"Xiong, H., Mei, Q., Zhao, Y.: Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Syst. J. (2018). \n                  https:\/\/doi.org\/10.1109\/JSYST.2018.2890126","journal-title":"IEEE Syst. J."},{"key":"465_CR63","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2865221","author":"H Xiong","year":"2018","unstructured":"Xiong, H., Zhang, H., Sun, J.: Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst. J. (2018). \n                  https:\/\/doi.org\/10.1109\/JSYST.2018.2865221","journal-title":"IEEE Syst. J."},{"key":"465_CR64","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.future.2019.03.008","volume":"97","author":"H Xiong","year":"2019","unstructured":"Xiong, H., Zhao, Y., Peng, L., Zhang, H., Yeh, K.H.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 97, 453\u2013461 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"465_CR65","doi-asserted-by":"crossref","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain Technology Overview. Technical report, National Institute of Standards and Technology (2018)","DOI":"10.6028\/NIST.IR.8202"},{"key":"465_CR66","doi-asserted-by":"crossref","unstructured":"Yang, X., Yi, X., Nepal, S., Han, F.: Decentralized voting: a self-tallying voting system using a smart contract on the Ethereum blockchain. In: International Conference on Web Information Systems Engineering, pp. 18\u201335. Springer, Berlin (2018)","DOI":"10.1007\/978-3-030-02922-7_2"},{"key":"465_CR67","doi-asserted-by":"crossref","unstructured":"Yu, B., Liu, J.K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P., Au, M.H.: Platform-independent secure blockchain-based voting system. In: International Conference on Information Security, pp. 369\u2013386. Springer, Berlin (2018)","DOI":"10.1007\/978-3-319-99136-8_20"},{"key":"465_CR68","doi-asserted-by":"crossref","unstructured":"Zag\u00f3rski, F., Carback, R.T., Chaum, D., Clark, J., Essex, A., Vora, P.L.: Remotegrity: design and use of an end-to-end verifiable remote voting system. In: International Conference on Applied Cryptography and Network Security, pp. 441\u2013457. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-38980-1_28"},{"issue":"5","key":"465_CR69","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1007\/s12083-018-0694-5","volume":"12","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Deng, E., Zhu, H., Cao, Z.: Smart contract for secure billing in ride-hailing service via blockchain. Peer-to-Peer Netw. Appl. 12(5), 1346\u20131357 (2019)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"465_CR70","doi-asserted-by":"crossref","unstructured":"Zhang, B., Zhou, H.S.: Statement voting. In: Financial Cryptography and Data Security 2019 (2018)","DOI":"10.1007\/978-3-030-32101-7_38"},{"key":"465_CR71","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Chan, T.H.H.: How to vote privately using Bitcoin. In: International Conference on Information and Communications Security, pp. 82\u201396. Springer, Berlin (2015)","DOI":"10.1007\/978-3-319-29814-6_8"},{"key":"465_CR72","doi-asserted-by":"crossref","unstructured":"Zheng, H., Xue, M., Lu, H., Hao, S., Zhu, H., Liang, X., Ross, K.W.: Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks, NDSS (2018)","DOI":"10.14722\/ndss.2018.23009"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00465-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00465-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00465-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T23:19:09Z","timestamp":1599002349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00465-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,3]]},"references-count":72,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["465"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00465-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,3]]},"assertion":[{"value":"3 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}