{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:25:32Z","timestamp":1762003532542},"reference-count":26,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1999,2,1]],"date-time":"1999-02-01T00:00:00Z","timestamp":917827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1999,2]]},"DOI":"10.1016\/s0140-3664(98)00241-2","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:56:11Z","timestamp":1027652171000},"page":"279-286","source":"Crossref","is-referenced-by-count":18,"title":["A secure and practical electronic voting scheme"],"prefix":"10.1016","volume":"22","author":[{"given":"Wei-Chi","family":"Ku","sequence":"first","affiliation":[]},{"given":"Sheng-De","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00241-2_BIB1","doi-asserted-by":"crossref","unstructured":"A. Fujioka, T. Okamoto, K. Ohta, A practical secret voting scheme for large scale elections, Advances in Cryptology \u2013 AUCRYPT\u201992, Springer-Verlag, Berlin, 1992, pp. 244\u2013251.","DOI":"10.1007\/3-540-57220-1_66"},{"issue":"2","key":"10.1016\/S0140-3664(98)00241-2_BIB2","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun ACM"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB3","doi-asserted-by":"crossref","unstructured":"A. Yao, Protocols for secure communications, Proceedings 23rd Annual IEEE Symposium Foundations of Computer Science, 1982 pp. 160\u2013164.","DOI":"10.1109\/SFCS.1982.38"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB4","doi-asserted-by":"crossref","unstructured":"R. Demillo, N. Lynch, M. Merritt, Cryptographic protocols, Proceedings 14th Annual ACM Symposium, Theory of Computing, 1982 pp.382\u2013400.","DOI":"10.1145\/800070.802214"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB5","doi-asserted-by":"crossref","unstructured":"D. Chaum, Elections with unconditionally secret ballots and disruption equivalent to breaking RSA, Advances in Cryptology \u2013 EUROCRYPT\u201988, Springer-Verlag, Berlin, 1988, pp. 177\u2013182.","DOI":"10.1007\/3-540-45961-8_15"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB6","unstructured":"T. Okamoto, A. Fujioka, K. Ohta, A practical large scale secret voting scheme based on non-anonymous channels, Proceedings of SCIS93, 1C, Japan, January 1993."},{"key":"10.1016\/S0140-3664(98)00241-2_BIB7","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/0167-4048(91)90081-N","article-title":"Secret ballot elections in computer networks","volume":"10","author":"Nurmi","year":"1991","journal-title":"Computer & Security"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB8","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/BF02032763","article-title":"Conducting secret ballot elections in computer networks: problems and solutions","volume":"51","author":"Nurmi","year":"1994","journal-title":"Annals of Operations Research"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB9","unstructured":"C. Body, Some applications of multiple key ciphers, Advances in Cryptology \u2013 EUROCRYPT\u201988, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1987, pp. 234\u2013238."},{"key":"10.1016\/S0140-3664(98)00241-2_BIB10","doi-asserted-by":"crossref","unstructured":"C. Boyd, A new multiple key ciphers and an improved voting scheme, Advances in Cryptology \u2013 EUROCRYPT\u201989, Springer-Verlag, Berlin, 1990, pp. 617\u2013625.","DOI":"10.1007\/3-540-46885-4_58"},{"issue":"4","key":"10.1016\/S0140-3664(98)00241-2_BIB11","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/0167-4048(96)00011-9","article-title":"A collision-free secret ballot protocol for computerized general elections","volume":"15","author":"Juang","year":"1996","journal-title":"Computers & Security"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB12","doi-asserted-by":"crossref","unstructured":"D. Cohen, M.H. Fisher, A robust and verifiable cryptographically secure election scheme, Proceedings of the 26th Annual IEEE Symposium on the Foundations of Computer Science, 1985, pp. 372\u2013382.","DOI":"10.1109\/SFCS.1985.2"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB13","doi-asserted-by":"crossref","unstructured":"J. Benaloh, M. Yung, Distributing the power of a government to enhance the privacy of voters, ACM symposium on Principles of Distributed Computing, 1986 pp. 52\u201362.","DOI":"10.1145\/10590.10595"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB14","doi-asserted-by":"crossref","unstructured":"K.R. Iversen, A cryptographic scheme for computerized general elections, Advances in Cryptology \u2013 CRYPTO\u201991, Springer-Verlag, Berlin, 1991, pp. 405\u2013419.","DOI":"10.1007\/3-540-46766-1_33"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB15","doi-asserted-by":"crossref","unstructured":"K. Sako, J. Kilian, Secure voting using partially compatible homomorphisms, Advances in Cryptology \u2013 CRYPTO\u201994, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1995, pp. 411\u2013424.","DOI":"10.1007\/3-540-48658-5_37"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB16","doi-asserted-by":"crossref","unstructured":"V. Niemi, A. Renvall, How to prevent buying of votes in computer elections, Advances in Cryptology \u2013 ASIACRYPT\u201994, Springer-Verlag, Berlin, 1994, pp. 141\u2013148.","DOI":"10.1007\/BFb0000432"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB17","doi-asserted-by":"crossref","unstructured":"J. Benaloh, D. Tuinstra, Receipt free secret ballot elections, Proceedings of the 26th Annual ACM Symposium on the Theory of Computing, 1994, pp. 544\u2013553.","DOI":"10.1145\/195058.195407"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB18","doi-asserted-by":"crossref","unstructured":"K. Sako, J. Kilian, Receipt-free mix-type voting scheme \u2013 a practical solution to the implementation of a voting booth, Advances in Cryptology \u2013 EUROCRYPT\u201995, Springer-Verlag, Berlin, 1995, pp. 393\u2013403.","DOI":"10.1007\/3-540-49264-X_32"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB19","first-page":"178","article-title":"ANDOS: a simple protocol for secret selling of secrets","volume":"47","author":"Renvall","year":"1990","journal-title":"EATCS Bull."},{"key":"10.1016\/S0140-3664(98)00241-2_BIB20","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key crypto-system","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB21","unstructured":"ISO\/ITU-T, Recommendation X.509: the directory authentication framework, 1993."},{"key":"10.1016\/S0140-3664(98)00241-2_BIB22","doi-asserted-by":"crossref","unstructured":"W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, IT-22, 1976, pp. 644\u2013654.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB23","doi-asserted-by":"crossref","unstructured":"S. Pohlig, M.E. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Transaction on Information Theory, IT-24, 1978, pp. 106\u2013110.","DOI":"10.1109\/TIT.1978.1055817"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB24","doi-asserted-by":"crossref","unstructured":"D. Chaum, Blind signature for untraceable payments, Advances in Cryptology \u2013 CRYPTO\u201982, Springer-Verlag, Berlin, 1983, pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB25","volume":"2","author":"Knuth","year":"1981"},{"key":"10.1016\/S0140-3664(98)00241-2_BIB26","doi-asserted-by":"crossref","unstructured":"K. Ohta, T. Okamoto, A. Fujioka, Secure bit commitment function, Advances in Cryptology \u2013 EUROCRYPT\u201992, Springer-Verlag, Berlin, 1992, pp. 324\u2013340.","DOI":"10.1007\/3-540-47555-9_27"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002412?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002412?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T05:53:41Z","timestamp":1580882021000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498002412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,2]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1999,2]]}},"alternative-id":["S0140366498002412"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00241-2","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1999,2]]}}}