{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:29:35Z","timestamp":1725686975017},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/iwcmc.2015.7289188","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:02:15Z","timestamp":1444082535000},"page":"817-821","source":"Crossref","is-referenced-by-count":2,"title":["Optimizing ring signature keys for e-voting"],"prefix":"10.1109","author":[{"given":"Jose Luis","family":"Tornos","sequence":"first","affiliation":[]},{"given":"Jose Luis","family":"Salazar","sequence":"additional","affiliation":[]},{"given":"Joan Josep","family":"Piles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"257","article-title":"Group signatures","author":"chaum","year":"1991","journal-title":"Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques"},{"key":"ref11","first-page":"325","article-title":"Linkable spontaneous anonymous group signature for ad hoc groups","author":"liu","year":"2004","journal-title":"ACISP"},{"article-title":"How to exchange secrets with oblivious transfer","year":"1981","author":"rabin","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"ref14","first-page":"234","article-title":"All-or-nothing disclosure of secrets","author":"brassard","year":"1987","journal-title":"Proceedings on Advances in cryptology&#x2014;CRYPTO '86"},{"key":"ref15","first-page":"1","author":"naor","year":"2005","journal-title":"Computationally secure oblivious transfer"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77493-8_11"},{"key":"ref4","article-title":"Receipt-free homomorphic elections and write-in ballots","author":"acquisti","year":"2004","journal-title":"Cryptology ePrint Archive"},{"key":"ref3","first-page":"339","article-title":"Making mix nets robust for electronic voting by randomized partial checking","author":"jakobsson","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-31979-5_5","article-title":"Short linkable ring signatures for e-voting, e-cash and attestation","author":"tsang","year":"2005","journal-title":"Proceedings of the First International Conference on Information Security Practice and Experience"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407"},{"key":"ref7","first-page":"389","article-title":"Receipt-free electronic voting scheme with a tamper-resistant randomizer","author":"lee","year":"2003","journal-title":"Proceedings of the 5th International Conference on Information Security and Cryptology"},{"key":"ref2","first-page":"14","article-title":"A new receipt-free e-voiting scheme based on blind signature","author":"xia","year":"2006","journal-title":"Proc of Workshop on Trustworthy Elections"},{"key":"ref1","first-page":"552","article-title":"How to leak a secret","author":"rivest","year":"2001","journal-title":"Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Advances in Cryptology"},{"article-title":"Design and implementation of a practical security-conscious electronic polling system","year":"1996","author":"cytron","key":"ref9"}],"event":{"name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2015,8,24]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7275105\/7288920\/07289188.pdf?arnumber=7289188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:49:02Z","timestamp":1498250942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7289188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2015.7289188","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}