{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:17:44Z","timestamp":1773843464531,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"\u201cPioneer\u201d and \u201cLeading Goose\u201d Research and Development Program of Zhejiang Province","doi-asserted-by":"publisher","award":["2022C03174"],"award-info":[{"award-number":["2022C03174"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372356"],"award-info":[{"award-number":["62372356"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92067103"],"award-info":[{"award-number":["92067103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Shaanxi Province","award":["2021ZDLGY06-02"],"award-info":[{"award-number":["2021ZDLGY06-02"]}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2019ZDLGY1202"],"award-info":[{"award-number":["2019ZDLGY1202"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Innovation Team Project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"name":"Xi\u2019an Science and Technology Innovation Plan","award":["20189168CX9JC10"],"award-info":[{"award-number":["20189168CX9JC10"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["YJS2212"],"award-info":[{"award-number":["YJS2212"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018925","name":"\u201c111 Center\u201d","doi-asserted-by":"crossref","award":["B16037"],"award-info":[{"award-number":["B16037"]}],"id":[{"id":"10.13039\/501100018925","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,2,1]]},"DOI":"10.1109\/jiot.2024.3478231","type":"journal-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T17:22:51Z","timestamp":1728667371000},"page":"3163-3176","source":"Crossref","is-referenced-by-count":2,"title":["Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7357-7826","authenticated-orcid":false,"given":"Yijie","family":"Shi","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7657-2123","authenticated-orcid":false,"given":"Yuhan","family":"Bai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Chonglin","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4234-9596","authenticated-orcid":false,"given":"Kan","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Memphis, Memphis, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-5404","authenticated-orcid":false,"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of the Ministry of Education for Wide Band Gap Semiconductor Materials and Devices, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3039359"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_10"},{"key":"ref5","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3406145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3411820"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3133840"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3418617"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3439725"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3011928"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074877"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3287394"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3336516"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2979856"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3108494"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3190909"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103795"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_33"},{"key":"ref20","first-page":"1","article-title":"Making mix nets robust for electronic voting by randomized partial checking","volume-title":"Proc. 11th USENIX Security Symp.","author":"Jakobsson"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NCTT.2003.1188334"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364331"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3446392"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22301-3_13"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref30","article-title":"Proof systems for general statements about discrete logarithms","author":"Camenisch","year":"1997"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_11"},{"key":"ref37","article-title":"Time-lock puzzles and timed-release crypto","author":"Rivest","year":"1996"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa025"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10852219\/10714361.pdf?arnumber=10714361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T19:07:36Z","timestamp":1738004856000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10714361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,1]]},"references-count":40,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3478231","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,1]]}}}