{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T17:07:25Z","timestamp":1742404045750,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,3]]},"DOI":"10.1109\/icbc51069.2021.9461101","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T20:16:55Z","timestamp":1624565815000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["\u00c6ternum: A Decentralized Voting System with Unconditional Privacy"],"prefix":"10.1109","author":[{"given":"Christian","family":"Killer","sequence":"first","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]},{"given":"Markus","family":"Knecht","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]},{"given":"Claude","family":"Muller","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]},{"given":"Bruno","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]},{"given":"Eder","family":"Scheid","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]},{"given":"Muriel","family":"Franco","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_22"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0519-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00419-4_8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_24"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30625-0_9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314815"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22270-7_5"},{"key":"ref36","article-title":"Unconditional Privacy in Remote Electronic Voting Theory and Practice","author":"locher","year":"2016","journal-title":"Ph D Dissertation"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0461-x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29381-9_32"},{"year":"2020","key":"ref10","article-title":"Regionalportr&#x00E4;ts 2020: Kennzahlen aller Gemeinden"},{"article-title":"Github: Aeternum - UP Voting System","year":"0","author":"mueller","key":"ref40"},{"article-title":"Verordnung der BK &#x00FC;ber die elektronische Stimmabgabe (VEleS)","year":"2013","author":"bundeskanzlei","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.05.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref14","article-title":"Review on Post-Quantum Cryptography","author":"chen","year":"8105","journal-title":"Tech Rep NISTIR"},{"article-title":"Documentation: Staking Module","year":"0","author":"sdk","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_27"},{"article-title":"Improving Helios with Everlasting Privacy Towards the Public","year":"0","author":"demirel","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"article-title":"Github: Provotum 2.0","year":"0","author":"eck","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2013.08.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"article-title":"End-to-end verifiability","year":"2015","author":"benaloh","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373884"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_38"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_19"},{"key":"ref2","article-title":"Helios: Web-based open-audit voting","author":"adida","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref9","first-page":"197","article-title":"Towards a Publicly-Verifiable Mix-Net Providing","volume":"7859","author":"buchmann","year":"2013","journal-title":"Financial Cryptography and Data Security FC 2013 Lecture Notes in Computer Science"},{"article-title":"Github: Helios Voting Server","year":"0","author":"adida","key":"ref1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"journal-title":"E-Voting System General Overview","year":"2005","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_2"},{"article-title":"Github: Koinonia","year":"0","author":"ge","key":"ref22"},{"year":"2016","key":"ref21","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49264-X_32"},{"article-title":"Cryptographic Key Length Recommendation","year":"2020","author":"giry","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359804"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3182658"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22270-7_3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDEG.2015.7114482"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_10"}],"event":{"name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2021,5,3]]},"location":"Sydney, Australia","end":{"date-parts":[[2021,5,6]]}},"container-title":["2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9460986\/9461049\/09461101.pdf?arnumber=9461101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:01:32Z","timestamp":1659484892000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9461101\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icbc51069.2021.9461101","relation":{},"subject":[],"published":{"date-parts":[[2021,5,3]]}}}