{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:54:48Z","timestamp":1730278488692,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/itw54588.2022.9965845","type":"proceedings-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T20:47:00Z","timestamp":1670446020000},"page":"374-379","source":"Crossref","is-referenced-by-count":2,"title":["Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority"],"prefix":"10.1109","author":[{"given":"Seyed Reza Hoseini","family":"Najarkolaei","sequence":"first","affiliation":[{"name":"Sharif University of Technology,Department of Electrical Engineering,Tehran,Iran"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nargess","family":"Kazempour","sequence":"additional","affiliation":[{"name":"Sharif University of Technology,Department of Electrical Engineering,Tehran,Iran"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[{"name":"Sharif University of Technology,Department of Electrical Engineering,Tehran,Iran"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deniz","family":"Gunduz","sequence":"additional","affiliation":[{"name":"Imperial College,Information Processing and Communications Lab,London,UK"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT50667.2020.9163533"},{"key":"ref38","article-title":"Secure coded multi-party computation for massive matrix operations","author":"nodehi","year":"2021","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546345"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613446"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT50667.2020.9163533"},{"key":"ref35","first-page":"10","article-title":"A full proof of the BGW protocol for perfectly-secure multiparty computation","volume":"18","author":"asharov","year":"2011","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_9"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ITW54588.2022.9965845"},{"key":"ref11","first-page":"81","article-title":"Robust receipt-free election system with ballot secrecy and verifiability","volume":"8","author":"chow","year":"2008","journal-title":"NDSS"},{"key":"ref12","first-page":"251","article-title":"A viewable e-voting scheme for environments with conflict of interest","author":"li","year":"2013","journal-title":"2013 IEEE Conference on Communications and Network Security (CNS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998951"},{"article-title":"A survey on feasibility and suitability of blockchain techniques for the e-voting systems","year":"2020","author":"\u00e7abuk","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.56"},{"key":"ref17","article-title":"A Verifiable Distributed Voting System Without a Trusted Party","author":"bouck","year":"2021","journal-title":"PhD thesis Arizona State University"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0575-0"},{"key":"ref28","article-title":"A voting scheme","volume":"88","author":"bos","year":"1988","journal-title":"Rump Session of Crypto '90"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref3","first-page":"729","article-title":"Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering","volume":"30","author":"pennock","year":"2000","journal-title":"AAAI\/IAAI"},{"key":"ref6","first-page":"244","article-title":"A practical secret voting scheme for large scale elections","author":"fujioka","year":"1992","journal-title":"Advances in Cryptology - AUSCRYPT &#x2019;92 Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_15"},{"key":"ref5","first-page":"199","article-title":"Blind signatures for untraceable payments","author":"chaum","year":"1982","journal-title":"Advances in Cryptology Proc of Crypto"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586121"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NCTT.2003.1188334"},{"article-title":"SignSGD with majority vote is communication efficient and fault tolerant","year":"2018","author":"bernstein","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30079-3_16"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(95)00105-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12980-3_6"},{"key":"ref22","article-title":"Voting with unconditional privacy: CFSY for booth voting","author":"van de graaf","year":"2009","journal-title":"Cryptology ePrint Archive"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_25"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335757"},{"article-title":"Secret sharing homomorphism and secure e-voting","year":"2016","author":"binu","key":"ref23"},{"key":"ref26","first-page":"52","article-title":"Non-interactive zero-knowledge proof systems","author":"santis","year":"1987","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"key":"ref25","first-page":"433","article-title":"Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack","author":"rackoff","year":"1991","journal-title":"Annual International Cryptology Conference"}],"event":{"name":"2022 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2022,11,1]]},"location":"Mumbai, India","end":{"date-parts":[[2022,11,9]]}},"container-title":["2022 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9965754\/9965755\/09965845.pdf?arnumber=9965845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:42:32Z","timestamp":1672083752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9965845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/itw54588.2022.9965845","relation":{},"subject":[],"published":{"date-parts":[[2022,11,1]]}}}