{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:35:17Z","timestamp":1759336517460},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642327469"},{"type":"electronic","value":"9783642327476"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32747-6_7","type":"book-chapter","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T04:24:14Z","timestamp":1347423854000},"page":"104-121","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient and Highly Sound Voter Verification Technique and Its Implementation"],"prefix":"10.1007","author":[{"given":"Rui","family":"Joaquim","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Adida, B.: Advances in Cryptographic Voting Systems. Ph.D. thesis, MIT (August 2006)"},{"key":"7_CR2","unstructured":"Adida, B.: Helios: Web-based open-audit voting. In: 17th USENIX Security Symposium (2008)"},{"key":"7_CR3","volume-title":"EVT 2006","author":"B. Adida","year":"2006","unstructured":"Adida, B., Neff, A.: Ballot casting assurance. In: EVT 2006. USENIX\/ACCURATE, Vancouver, B.C. (2006)"},{"key":"7_CR4","volume-title":"EVT\/WOTE 2009","author":"B. Adida","year":"2009","unstructured":"Adida, B., Neff, A.: Efficient receipt-free ballot casting resistant to covert channels. In: EVT\/WOTE 2009. USENIX\/ACCURATE\/IAVOSS, Montreal, Canada (August 2009)"},{"key":"7_CR5","volume-title":"EVT 2006","author":"J. Benaloh","year":"2006","unstructured":"Benaloh, J.: Simple verifiable elections. In: EVT 2006. USENIX\/ACCURATE, Vancouver, B.C. (2006)"},{"key":"7_CR6","volume-title":"EVT 2007","author":"J. Benaloh","year":"2007","unstructured":"Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: EVT 2007. USENIX\/ACCURATE, Boston, MA (2007)"},{"key":"7_CR7","unstructured":"Benaloh, J.C.: Verifiable Secret-Ballot Elections. Ph.D. thesis, Yale University (1987)"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"02","author":"D. Chaum","year":"2004","unstructured":"Chaum, D.: Secret-ballot receipts: True voter-verifiable election. IEEE Security & Privacy\u00a002(1), 38\u201347 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"7_CR10","unstructured":"Chaum, D.: Punchscan (September 2009), \n                    \n                      http:\/\/www.punchscan.org\/"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11555827_8","volume-title":"Computer Security \u2013 ESORICS 2005","author":"D. Chaum","year":"2005","unstructured":"Chaum, D., Ryan, P.Y.A., Schneider, S.: A Practical Voter-Verifiable Election Scheme. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 118\u2013139. Springer, Heidelberg (2005)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Clarkson, M., Chong, S., Myers, A.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354\u2013368 (May 2008)","DOI":"10.1109\/SP.2008.32"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"issue":"4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 539\u2013556. Springer, Heidelberg (2000)"},{"key":"7_CR18","unstructured":"Joaquim, R., Ribeiro, C.: An efficient and highly sound voter verification technique and its implementation - extended version. Tech. Rep. 40\/2011, INESC-ID (September 2011)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-04135-8_7","volume-title":"E-Voting and Identity","author":"R. Joaquim","year":"2009","unstructured":"Joaquim, R., Ribeiro, C., Ferreira, P.: VeryVote: A Voter Verifiable Code Voting System. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) VOTE-ID 2009. LNCS, vol.\u00a05767, pp. 106\u2013121. Springer, Heidelberg (2009)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: WPES, Alexandria, Virginia, USA, pp. 61\u201370 (November 2005)","DOI":"10.1145\/1102199.1102213"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11818175_22","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"T. Moran","year":"2006","unstructured":"Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 373\u2013392. Springer, Heidelberg (2006), \n                    \n                      http:\/\/www.seas.harvard.edu\/~talm\/papers\/MN06-voting.pdf"},{"key":"7_CR22","unstructured":"Neff, C.A.: Practical high certainty intent verification for encrypted votes (2004), \n                    \n                      http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.134.1006&rep=rep1&type=pdf"},{"key":"7_CR23","unstructured":"NIST: Gigital signature standard (dss) (June 2009), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips186-3\/fips_186-3.pdf\n                    \n                    \n                  , FIPS 186-3"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BFb0028157","volume-title":"Security Protocols","author":"T. Okamoto","year":"1998","unstructured":"Okamoto, T.: Receipt-free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 25\u201335. Springer, Heidelberg (1998)"},{"key":"7_CR25","unstructured":"Sandler, D., Derr, K., Wallach, D.S.: Votebox: A tamper-evident verifiable electronic voting system. In: 16th USENIX Security Symposium (2007)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on java card smart cards. In: 1st IEEE International Workshop on Information Forensics and Security, pp. 106\u2013110 (2009)","DOI":"10.1109\/WIFS.2009.5386474"},{"key":"7_CR27","unstructured":"Wikipedia: (April 2011), \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Exponentiation_by_squaring#Computation_by_powers_of_2"}],"container-title":["Lecture Notes in Computer Science","E-Voting and Identity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32747-6_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:14:46Z","timestamp":1620116086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32747-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642327469","9783642327476"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32747-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}