{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T12:36:51Z","timestamp":1770727011072,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172405"],"award-info":[{"award-number":["62172405"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872381"],"award-info":[{"award-number":["61872381"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009592","name":"Beijing Municipal Science and Technology Commission","doi-asserted-by":"publisher","award":["Z191100007119006"],"award-info":[{"award-number":["Z191100007119006"]}],"id":[{"id":"10.13039\/501100009592","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tcss.2022.3162869","type":"journal-article","created":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T19:32:33Z","timestamp":1649791953000},"page":"1039-1056","source":"Crossref","is-referenced-by-count":8,"title":["PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8593-9636","authenticated-orcid":false,"given":"Siqi","family":"Lu","sequence":"first","affiliation":[{"name":"Key Laboratory of Network Cryptography Technology of Henan, Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2195-0799","authenticated-orcid":false,"given":"Zhaoxuan","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xuyang","family":"Miao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Network Cryptography Technology of Henan, Information Engineering University, Zhengzhou, China"}]},{"given":"Qingdi","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Information Science and Engineering, School of Computer Science, Ocean University of China, Qingdao, China"}]},{"given":"Jianhua","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/90"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_10"},{"key":"ref34","article-title":"An improved e-voting scheme using secret sharing based secure multi-party computation","author":"nair","year":"2015","journal-title":"arXiv 1502 07469"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/47"},{"key":"ref37","first-page":"343","article-title":"Multiparty computation for interval, equality, and comparison without bit-decomposition protocol","volume":"4450","author":"nishide","year":"2007","journal-title":"Public Key Cryptography"},{"key":"ref14","first-page":"1067","article-title":"How hard is it to control an election by breaking ties?","volume":"263","author":"mattei","year":"2014","journal-title":"ECAI"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114434"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2950637"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.3010807"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01014-3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107446984"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2970305"},{"key":"ref2","first-page":"983","article-title":"Blockchain-based E-voting system","author":"hj\u00e1lmarsson","year":"2018","journal-title":"Proc IEEE 11th Int Conf Cloud Comput (CLOUD)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000372"},{"key":"ref17","first-page":"1549","article-title":"Proportionality and strategyproofness in multiwinner elections","author":"peters","year":"2018","journal-title":"AAMAS"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2162-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9429"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5115"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2020.103401"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-018-9392-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NCTT.2003.1188334"},{"key":"ref46","first-page":"696","article-title":"The TAMARIN prover for the symbolic analysis of security protocols","volume":"8044","author":"meier","year":"2013","journal-title":"CAV"},{"key":"ref23","first-page":"393","article-title":"Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth","volume":"921","author":"sako","year":"1995","journal-title":"Eurocrypt"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"ref26","first-page":"335","article-title":"Helios: Web-based open-audit voting","author":"adida","year":"2008","journal-title":"Proc Usenix Secur Symp"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.05.006"},{"key":"ref42","first-page":"723","article-title":"On deploying secure computing commercially: Private intersection-sum protocols and their business applications","volume":"2019","author":"ion","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02922-7_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/29"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/23"},{"key":"ref43","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximate numbers","volume":"10624","author":"cheon","year":"2017","journal-title":"Adv Cryptology"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080556"},{"key":"ref27","article-title":"Verifiable secret-ballot elections","author":"benaloh","year":"1987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.065"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/240"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2773581"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2913165"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.051"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2938841"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2999574"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.023"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10132891\/09756417.pdf?arnumber=9756417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T18:16:37Z","timestamp":1687198597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9756417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2022.3162869","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}