{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:21Z","timestamp":1775913021910,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/icbc54727.2022.9805556","type":"proceedings-article","created":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T19:46:19Z","timestamp":1656531979000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["ProvotuMN: Decentralized, Mix-Net-based, and Receipt-free Voting System"],"prefix":"10.1109","author":[{"given":"Christian","family":"Killer","sequence":"first","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Moritz","family":"Eck","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Bruno","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Jan","family":"von der Assen","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Roger","family":"Staubli","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH-8050"}]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[{"name":"University of Zurich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH-8050"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Provotum Vote Verifier App","author":"maddaloni","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29381-9_32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314815"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2013.08.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12980-3_3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_21"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314815"},{"key":"ref36","first-page":"1","article-title":"From Centralized to Decentralized Remote Electronic Voting","author":"killer","year":"2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373884"},{"key":"ref34","first-page":"1","article-title":"&#x00C6;ternum: A Decentralized Voting System with Unconditional Privacy","author":"killer","year":"2021","journal-title":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_23"},{"key":"ref29","article-title":"Did You Mix Me? Formally Verifying Verifiable Mix Nets in Electronic Voting","author":"haines","year":"2020","journal-title":"Cryptology ePrint Archive Report 2020\/1114"},{"key":"ref2","article-title":"An Overview of End-to-End Verifiable Voting Systems","author":"ali","year":"2016","journal-title":"CoRR"},{"key":"ref1","article-title":"An Efficient Scheme for Proving a Shuffle, author=Furukawa, Jun and Sako, Kazue, booktitle=Annual International Cryptology Conference, pages=368&#x2013;387, year=2001, organization=Springer","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_12"},{"key":"ref22","first-page":"244","article-title":"A Practical Secret Voting Scheme for Large Scale Elections","author":"fujioka","year":"1992","journal-title":"International Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_4"},{"key":"ref24","first-page":"325","article-title":"CHVote System Specification 3.2","volume":"2017","author":"haenni","year":"2017","journal-title":"IACR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_8"},{"key":"ref26","first-page":"272","article-title":"Improving the Performance of Cryptographic Voting Protocols","author":"haenni","year":"2019","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_27"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054851"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"ref14","article-title":"Verordnung &#x00FC;ber die politischen Rechte (VPR) (vom 24. Mai 1978 (Stand 1. Juli 2019))","year":"1978"},{"key":"ref15","article-title":"Provotum Mixnet Source Code","author":"eck","year":"0"},{"key":"ref16","article-title":"Mixnets in a Distributed LedgerRemote Electronic Voting System","author":"eck","year":"2021","journal-title":"Master thesis"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0009817103100321"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8235"},{"key":"ref4","first-page":"1192","article-title":"A Guide to Fully Homomorphic Encryption","volume":"2015","author":"armknecht","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref3","article-title":"PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain","volume":"2058","author":"angelis","year":"2018","journal-title":"ITASEC ser CEUR Workshop Proceedings"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"ref5","author":"baraani-dastjerdi","year":"1994","journal-title":"A Practical Electronic Voting Protocol Using Threshold Schemes"},{"key":"ref8","first-page":"544","article-title":"Receipt-Free Secret-Ballot Elections","author":"benaloh","year":"1994","journal-title":"26th Annual ACM Symposium on Theory of Computing (STOC &#x2019;94)"},{"key":"ref7","article-title":"Simple Verifiable Elections","volume":"6","author":"benaloh","year":"2006","journal-title":"2006 USENIX\/ACCURATE Electronic Voting Technology Workshop EVT'06"},{"key":"ref49","article-title":"Verificatum Mix-Net (VMN)","author":"wikstr\u00f6m","year":"2020"},{"key":"ref9","first-page":"167","article-title":"Cryptographic Voting &#x2014; A Gentle Introduction","author":"bernhard","year":"2013","journal-title":"Foundations of Security Analysis and Design VII"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660315"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_7"},{"key":"ref47","article-title":"Provotum CI\/CD Source Code","author":"staubli","year":"0"},{"key":"ref42","article-title":"Substrate v3.0\/0.9 &#x2013; Apollo 14","year":"0"},{"key":"ref41","article-title":"Substrate: The Platform for Blockchain Innovators","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81701-5_12"},{"key":"ref43","first-page":"248","article-title":"Efficient Anonymous Channel and All\/Nothing Election Scheme","author":"park","year":"1993","journal-title":"Workshop on the Theory and Application of of Cryptographic Techniques"}],"event":{"name":"2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Shanghai, China","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9805458\/9805482\/09805556.pdf?arnumber=9805556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:13Z","timestamp":1658780053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9805556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icbc54727.2022.9805556","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}