{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T22:24:14Z","timestamp":1751754254879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359804","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"270-285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Koinonia"],"prefix":"10.1145","author":[{"given":"Huangyi","family":"Ge","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Sze Yiu","family":"Chau","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Victor E","family":"Gonsalves","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Huian","family":"Li","sequence":"additional","affiliation":[{"name":"Indiana University Purdue, University Indianapolis"}]},{"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Xukai","family":"Zou","sequence":"additional","affiliation":[{"name":"Indiana University Purdue, University Indianapolis"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Helios: Web-based Open-audit Voting. In USENIX Security Symposium","volume":"17","author":"Adida B.","year":"2008","unstructured":"B. Adida . 2008 . Helios: Web-based Open-audit Voting. In USENIX Security Symposium , Vol. 17 . USENIX Association, 335--348. B. Adida. 2008. Helios: Web-based Open-audit Voting. In USENIX Security Symposium, Vol. 17. USENIX Association, 335--348."},{"volume-title":"Proceedings of the Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE).","author":"Adida B.","key":"e_1_3_2_1_2_1","unstructured":"B. Adida , O. De Marneffe , O. Pereira , and J. Quisquater . 2009. Electing a University President Using Open-audit Voting: Analysis of Real-world Use of Helios . In Proceedings of the Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE). B. Adida, O. De Marneffe, O. Pereira, and J. Quisquater. 2009. Electing a University President Using Open-audit Voting: Analysis of Real-world Use of Helios. In Proceedings of the Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"R. Ara\u00fajo A. Barki S. Brunet and J. Traor\u00e9. 2016. Remote Electronic Voting can be Efficient Verifiable and Coercion-Resistant. (2016) 224--232.  R. Ara\u00fajo A. Barki S. Brunet and J. Traor\u00e9. 2016. Remote Electronic Voting can be Efficient Verifiable and Coercion-Resistant. (2016) 224--232.","DOI":"10.1007\/978-3-662-53357-4_15"},{"volume-title":"11th International Conference on Information Assurance and Security (IAS). 140--145","author":"Azougaghe A.","key":"e_1_3_2_1_4_1","unstructured":"A. Azougaghe , M. Hedabou , and M. Belkasmi . 2015. An electronic voting system based on homomorphic encryption and prime numbers . In 11th International Conference on Information Assurance and Security (IAS). 140--145 . A. Azougaghe, M. Hedabou, and M. Belkasmi. 2015. An electronic voting system based on homomorphic encryption and prime numbers. In 11th International Conference on Information Assurance and Security (IAS). 140--145."},{"key":"e_1_3_2_1_5_1","volume-title":"2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13)","volume":"1","author":"Bell Susan","year":"2013","unstructured":"Susan Bell , Josh Benaloh , Michael D. Byrne , Dana Debeauvoir , Bryce Eakin , Philip Kortum , Neal McBurnett , Olivier Pereira , Philip B. Stark , Dan S. Wallach , Gail Fisher , Julian Montoya , Michelle Parker , and Michael Winn . 2013 . STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System . In 2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13) , in USENIX Journal of Election Technology and Systems (JETS) , Volume 1 , Number 1. USENIX Association, Washington, D.C., 18--39. https:\/\/www.usenix.org\/conference\/evtwote13\/workshop-program\/presentation\/bell Susan Bell, Josh Benaloh, Michael D. Byrne, Dana Debeauvoir, Bryce Eakin, Philip Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach, Gail Fisher, Julian Montoya, Michelle Parker, and Michael Winn. 2013. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. In 2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13), in USENIX Journal of Election Technology and Systems (JETS), Volume 1, Number 1. USENIX Association, Washington, D.C., 18--39. https:\/\/www.usenix.org\/conference\/evtwote13\/workshop-program\/presentation\/bell"},{"volume-title":"Proceedings of the 26th Annual ACM Symposium on Theory of Computing. ACM","author":"Benaloh J.","key":"e_1_3_2_1_7_1","unstructured":"J. Benaloh and D. Tuinstra . 1994. Receipt-free secret-ballot elections . In Proceedings of the 26th Annual ACM Symposium on Theory of Computing. ACM , New York, 544--553. J. Benaloh and D. Tuinstra. 1994. Receipt-free secret-ballot elections. In Proceedings of the 26th Annual ACM Symposium on Theory of Computing. ACM, New York, 544--553."},{"key":"e_1_3_2_1_8_1","volume-title":"What happened in the Utah GOP caucus. https:\/\/mbernhard.com\/Utahvoting.pdf","author":"Bernhard M.","year":"2016","unstructured":"M. Bernhard . 2016. What happened in the Utah GOP caucus. https:\/\/mbernhard.com\/Utahvoting.pdf ( 2016 ). M. Bernhard. 2016. What happened in the Utah GOP caucus. https:\/\/mbernhard.com\/Utahvoting.pdf (2016)."},{"key":"e_1_3_2_1_9_1","volume-title":"Second International Joint Conference on Electronic Voting, 24 \u00e2\u0102\u015e","author":"Bernhard Matthew","year":"2017","unstructured":"Matthew Bernhard , Josh Benaloh , J. Alex Halderman , Ronald L. Rivest , Peter Y. A. Ryan , Philip B. Stark , Vanessa Teague , Poorvi L. Vora , and Dan S. Wallach . 2017. Public Evidence from Secret Ballots . Second International Joint Conference on Electronic Voting, 24 \u00e2\u0102\u015e 27 October 2017 , Bregenz, Austria (2017). Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, and Dan S. Wallach. 2017. Public Evidence from Secret Ballots. Second International Joint Conference on Electronic Voting, 24 \u00e2\u0102\u015e 27 October 2017, Bregenz, Austria (2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"J. Bos. 1992. Practical Privacy. PhD thesis Technische Universiteit Eindhoven Eindhoven The Netherlands Available online: http:\/\/alexandria.tue.nl\/extra3\/proefschrift\/PRF8A\/9201032.pdf (1992).  J. Bos. 1992. Practical Privacy. PhD thesis Technische Universiteit Eindhoven Eindhoven The Netherlands Available online: http:\/\/alexandria.tue.nl\/extra3\/proefschrift\/PRF8A\/9201032.pdf (1992)."},{"key":"e_1_3_2_1_11_1","volume-title":"Rump session, Does not appear in proceedings","author":"Bos J.","year":"1988","unstructured":"J. Bos and G Purdy . 1988. A voting scheme. CRYPTO 88 , Rump session, Does not appear in proceedings ( 1988 ). J. Bos and G Purdy. 1988. A voting scheme. CRYPTO 88, Rump session, Does not appear in proceedings (1988)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"C. Boyd. 1990. A new multiple key cipher and an improved voting scheme. In EUROCRYPT. 617--625.  C. Boyd. 1990. A new multiple key cipher and an improved voting scheme. In EUROCRYPT. 617--625.","DOI":"10.1007\/3-540-46885-4_58"},{"key":"e_1_3_2_1_13_1","unstructured":"I. Brightwell J. Cucurull D. Galindo and S. Guasch. 2015. An overview of the iVote 2015 voting system. Technical report Aug. 2015. https:\/\/www.elections.nsw.gov.au\/__data\/assets\/pdf_file\/0019\/204058\/An_overview_of_the_iVote_2015_voting_system_v4.pdf (2015).  I. Brightwell J. Cucurull D. Galindo and S. Guasch. 2015. An overview of the iVote 2015 voting system. Technical report Aug. 2015. https:\/\/www.elections.nsw.gov.au\/__data\/assets\/pdf_file\/0019\/204058\/An_overview_of_the_iVote_2015_voting_system_v4.pdf (2015)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.69"},{"key":"e_1_3_2_1_15_1","volume-title":"Ordinance of 13 december 2013 on electronic voting (veles). https:\/\/www.admin.ch\/opc\/en\/classified-compilation\/20132343\/index.html","author":"Chancellery S. F.","year":"2013","unstructured":"S. F. Chancellery . 2013. Ordinance of 13 december 2013 on electronic voting (veles). https:\/\/www.admin.ch\/opc\/en\/classified-compilation\/20132343\/index.html ( 2013 ). S. F. Chancellery. 2013. Ordinance of 13 december 2013 on electronic voting (veles). https:\/\/www.admin.ch\/opc\/en\/classified-compilation\/20132343\/index.html (2013)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"volume-title":"Proc. of the 10th European Conf. on Research in Comp. Security (ESORICS'05)","author":"Chaum D.","key":"e_1_3_2_1_19_1","unstructured":"D. Chaum , P. Ryan , and S. Schneider . 2005. A practical voter-verifiable election scheme . In Proc. of the 10th European Conf. on Research in Comp. Security (ESORICS'05) . Milan, Italy, 118--139. D. Chaum, P. Ryan, and S. Schneider. 2005. A practical voter-verifiable election scheme. In Proc. of the 10th European Conf. on Research in Comp. Security (ESORICS'05). Milan, Italy, 118--139."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"B. Chevallier-mames P. A. Fouque D. Pointcheval J. Stern and J. Traor\u00e9. 2010. On some incompatible properties of voting schemes. (book chapter). In Towards trustworthy elections http:\/\/dl.acm.org\/citation.cfm?id=2167913.2167924. 191--199.  B. Chevallier-mames P. A. Fouque D. Pointcheval J. Stern and J. Traor\u00e9. 2010. On some incompatible properties of voting schemes. (book chapter). In Towards trustworthy elections http:\/\/dl.acm.org\/citation.cfm?id=2167913.2167924. 191--199.","DOI":"10.1007\/978-3-642-12980-3_11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"B. Chevallier-Mames P. A. Fouque D. Pointcheval J. Stern and J. Traor\u00e9. 2010. Towards Trustworthy Elections. Chapter on some incompatible properties of voting schemes 191--199.  B. Chevallier-Mames P. A. Fouque D. Pointcheval J. Stern and J. Traor\u00e9. 2010. Towards Trustworthy Elections. Chapter on some incompatible properties of voting schemes 191--199.","DOI":"10.1007\/978-3-642-12980-3_11"},{"volume-title":"Proc. of IEEE S & P. 354--368","author":"Clarkson M.","key":"e_1_3_2_1_22_1","unstructured":"M. Clarkson , S. Chong , and A. Myers . 2008. Civitas: Toward a secure voting system . In Proc. of IEEE S & P. 354--368 . M. Clarkson, S. Chong, and A. Myers. 2008. Civitas: Toward a secure voting system. In Proc. of IEEE S & P. 354--368."},{"key":"e_1_3_2_1_23_1","volume-title":"National Election Commission","author":"Estonian National Election Commission. 2005.","year":"2005","unstructured":"Estonian National Election Commission. 2005. E-Voting System Overview. Technical report , National Election Commission , Tallinn , Estonia ( 2005 ). Estonian National Election Commission. 2005. E-Voting System Overview. Technical report, National Election Commission, Tallinn, Estonia (2005)."},{"key":"e_1_3_2_1_24_1","unstructured":"Estonian Internet Voting Committee. 2014. Statistics about Internet voting in Estonia. http:\/\/www.vvk.ee\/voting-methods-in-estonia\/engindex\/statistics (2014).  Estonian Internet Voting Committee. 2014. Statistics about Internet voting in Estonia. http:\/\/www.vvk.ee\/voting-methods-in-estonia\/engindex\/statistics (2014)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2595846.2595849"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"R. Cramer I. Damg\u00e5rd and B. Schoenmakers. 1994. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In CRYPTO. 174--187.  R. Cramer I. Damg\u00e5rd and B. Schoenmakers. 1994. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In CRYPTO. 174--187.","DOI":"10.1007\/3-540-48658-5_19"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"R. Cramer M. Franklin B. Schoenmakers and M. Yung. 1996. Multi-Authority Secret-Ballot Elections with Linear Work. In Advances in Cryptology - EUROCRYPT'96. Vol. 1070. 72--83.  R. Cramer M. Franklin B. Schoenmakers and M. Yung. 1996. Multi-Authority Secret-Ballot Elections with Linear Work. In Advances in Cryptology - EUROCRYPT'96. Vol. 1070. 72--83.","DOI":"10.1007\/3-540-68339-9_7"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"R. Cramer R. Gennaro and B. Schoenmakers. 1997. A secure and optimally efficient multi-authority election scheme. In EUROCRYPT. 103--118.  R. Cramer R. Gennaro and B. Schoenmakers. 1997. A secure and optimally efficient multi-authority election scheme. In EUROCRYPT. 103--118.","DOI":"10.1007\/3-540-69053-0_9"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746338"},{"key":"e_1_3_2_1_30_1","volume-title":"Lectures on Data Security, Modern Cryptology in Theory and Practice","author":"Damg\u00e5rd Ivan","year":"1998","unstructured":"Ivan Damg\u00e5rd . 1999. Commitment Schemes and Zero-Knowledge Protocols . In Lectures on Data Security, Modern Cryptology in Theory and Practice , Summer School, Aarhus, Denmark , July 1998 . Springer-Verlag , London, UK, UK, 63--86. http:\/\/dl.acm.org\/citation.cfm?id=647423.760339 Ivan Damg\u00e5rd. 1999. Commitment Schemes and Zero-Knowledge Protocols. In Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998. Springer-Verlag, London, UK, UK, 63--86. http:\/\/dl.acm.org\/citation.cfm?id=647423.760339"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134101"},{"volume-title":"International Conference on E-Voting and Identity. Springer, 156--175","author":"Demirel D.","key":"e_1_3_2_1_32_1","unstructured":"D. Demirel , M. Henning , J. van de Graaf, P. YA Ryan, and J. Buchmann. 2013. Pr\u00eat \u00e0 Voter Providing Everlasting Privacy . In International Conference on E-Voting and Identity. Springer, 156--175 . D. Demirel, M. Henning, J. van de Graaf, P. YA Ryan, and J. Buchmann. 2013. Pr\u00eat \u00e0 Voter Providing Everlasting Privacy. In International Conference on E-Voting and Identity. Springer, 156--175."},{"volume-title":"Proceedings of the International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE'12)","author":"Demirel D.","key":"e_1_3_2_1_33_1","unstructured":"D. Demirel , J. Van De Graaf, and R. Ara\u00fajo. 2012. Improving Helios with Everlasting Privacy Towards the Public . In Proceedings of the International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE'12) . D. Demirel, J. Van De Graaf, and R. Ara\u00fajo. 2012. Improving Helios with Everlasting Privacy Towards the Public. In Proceedings of the International Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE'12)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100272"},{"volume-title":"Advances in Crypt.-Crypto '86","author":"Fiat A.","key":"e_1_3_2_1_35_1","unstructured":"A. Fiat and A. Shamir . 1987. How to prove yourself: Practical solutions to identification and signature problems . In Advances in Crypt.-Crypto '86 . Springer-Verlag, New York, 186--194. A. Fiat and A. Shamir. 1987. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Crypt.-Crypto '86. Springer-Verlag, New York, 186--194."},{"key":"e_1_3_2_1_36_1","unstructured":"L. Fouard M. Duclos and P. Lafourcade. 2007. Survey on Electronic Voting Schemes. http:\/\/www-verimag.imag.fr\/duclos\/paper\/e-vote.pdf. (2007).  L. Fouard M. Duclos and P. Lafourcade. 2007. Survey on Electronic Voting Schemes. http:\/\/www-verimag.imag.fr\/duclos\/paper\/e-vote.pdf. (2007)."},{"volume-title":"Stanford Javascript Crypto Library. (2009). https:\/\/github.com\/bitwiseshiftleft\/sjcl [Online","year":"2017","key":"e_1_3_2_1_37_1","unstructured":"Github. 2009. Stanford Javascript Crypto Library. (2009). https:\/\/github.com\/bitwiseshiftleft\/sjcl [Online ; accessed 8- May .- 2017 ]. Github. 2009. Stanford Javascript Crypto Library. (2009). https:\/\/github.com\/bitwiseshiftleft\/sjcl [Online; accessed 8-May.-2017]."},{"key":"e_1_3_2_1_38_1","volume-title":"3rd International Conference on E-Voting and Identity, VoteID \u00e2\u0102&Zacute;11","author":"Gj\u00c3\u00ffsteen K.","year":"2011","unstructured":"K. Gj\u00c3\u00ffsteen . 2011 . The Norwegian Internet voting protocol . In 3rd International Conference on E-Voting and Identity, VoteID \u00e2\u0102&Zacute;11 (2011). K. Gj\u00c3\u00ffsteen. 2011. The Norwegian Internet voting protocol. In 3rd International Conference on E-Voting and Identity, VoteID \u00e2\u0102&Zacute;11 (2011)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"G. S. Grewal M. D. Ryan S. Bursuc and P. Y. Ryan. 2013. Caveat Coercitor: coercion-evidence in electronic voting. In IEEE S & P.  G. S. Grewal M. D. Ryan S. Bursuc and P. Y. Ryan. 2013. Caveat Coercitor: coercion-evidence in electronic voting. In IEEE S & P.","DOI":"10.1109\/SP.2013.32"},{"volume-title":"Du-Vote: Remote Electronic Voting with Untrusted Computers. In IEEE 28th Computer Security Foundations Symposium. 155--169","author":"Grewal G. S.","key":"e_1_3_2_1_40_1","unstructured":"G. S. Grewal , M. D. Ryan , L. Chen , and M. R. Clarkson . 2015 . Du-Vote: Remote Electronic Voting with Untrusted Computers. In IEEE 28th Computer Security Foundations Symposium. 155--169 . G. S. Grewal, M. D. Ryan, L. Chen, and M. R. Clarkson. 2015. Du-Vote: Remote Electronic Voting with Untrusted Computers. In IEEE 28th Computer Security Foundations Symposium. 155--169."},{"volume-title":"Proc. of ACM WPES. ACM, 61--70","author":"Juels A.","key":"e_1_3_2_1_41_1","unstructured":"A. Juels , D. Catalano , and M. Jakobsson . 2005. Coercion-resistant electronic elections . In Proc. of ACM WPES. ACM, 61--70 . A. Juels, D. Catalano, and M. Jakobsson. 2005. Coercion-resistant electronic elections. In Proc. of ACM WPES. ACM, 61--70."},{"issue":"0","key":"e_1_3_2_1_42_1","first-page":"2898","article-title":"PKCS #5","volume":"2","author":"Kaliski B.","year":"2000","unstructured":"B. Kaliski . 2000 . PKCS #5 : Password-Based Cryptography Specification Version 2 . 0 . RFC 2898 . RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2898.txt http:\/\/www.rfc-editor.org\/rfc\/rfc2898.txt. B. Kaliski. 2000. PKCS #5: Password-Based Cryptography Specification Version 2.0. RFC 2898. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2898.txt http:\/\/www.rfc-editor.org\/rfc\/rfc2898.txt.","journal-title":"Password-Based Cryptography Specification Version"},{"volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15)","author":"Kiayias A.","key":"e_1_3_2_1_43_1","unstructured":"A. Kiayias , T. Zacharias , and B. Zhang . 2015. DEMOS-2: Scalable E2E Verifiable Elections Without Random Oracles . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15) . ACM, 352--363. A. Kiayias, T. Zacharias, and B. Zhang. 2015. DEMOS-2: Scalable E2E Verifiable Elections Without Random Oracles. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). ACM, 352--363."},{"volume-title":"Proc. of SSGRR.","author":"Kim K.","key":"e_1_3_2_1_44_1","unstructured":"K. Kim , J. Kim , B. Lee , and G. Ahn . 2001. Experimental Design of Worldwide Internet Voting System Using PKI . In Proc. of SSGRR. K. Kim, J. Kim, B. Lee, and G. Ahn. 2001. Experimental Design of Worldwide Internet Voting System Using PKI. In Proc. of SSGRR."},{"key":"e_1_3_2_1_45_1","first-page":"245","article-title":"Providing Receipt-freeness in Mixnet-based Voting Protocols","volume":"2971","author":"Lee B.","year":"2003","unstructured":"B. Lee , C. Boyd , E. Dawson , K. Kim , J. Yang , and S. Yoo . 2003 . Providing Receipt-freeness in Mixnet-based Voting Protocols . In Proc. of Info. Security and Cryptology , Vol. 2971. 245 -- 258 . B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. 2003. Providing Receipt-freeness in Mixnet-based Voting Protocols. In Proc. of Info. Security and Cryptology, Vol. 2971. 245--258.","journal-title":"Proc. of Info. Security and Cryptology"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"P. Locher and R. Haenni. 2015. Verifiable Internet Elections with Everlasting Privacy and Minimal Trust. Springer International Publishing 74--91.  P. Locher and R. Haenni. 2015. Verifiable Internet Elections with Everlasting Privacy and Minimal Trust. Springer International Publishing 74--91.","DOI":"10.1007\/978-3-319-22270-7_5"},{"key":"e_1_3_2_1_47_1","volume-title":"Coercion-Resistant Internet Voting with Everlasting Privacy. In International Conference on Financial Cryptography and Data Security. Springer, 161--175","author":"Locher P.","year":"2016","unstructured":"P. Locher , R. Haenni , and R. E Koenig . 2016 . Coercion-Resistant Internet Voting with Everlasting Privacy. In International Conference on Financial Cryptography and Data Security. Springer, 161--175 . P. Locher, R. Haenni, and R. E Koenig. 2016. Coercion-Resistant Internet Voting with Everlasting Privacy. In International Conference on Financial Cryptography and Data Security. Springer, 161--175."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"T. Moran and M. Naor. 2006. Receipt-free Universally-verifiable Voting with Everlasting Privacy. In CRYPTO. 373--392.  T. Moran and M. Naor. 2006. Receipt-free Universally-verifiable Voting with Everlasting Privacy. In CRYPTO. 373--392.","DOI":"10.1007\/11818175_22"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315277"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698756"},{"volume-title":"Proc. of 2nd Int. Workshop on Info. Security (ISW '99)","author":"Ohkubo M.","key":"e_1_3_2_1_51_1","unstructured":"M. Ohkubo , F. Miura , M. Abe , A. Fujioka , and T. Okamoto . 1999. An Improvement on a Practical Secret Voting Scheme . In Proc. of 2nd Int. Workshop on Info. Security (ISW '99) . 225--234. M. Ohkubo, F. Miura, M. Abe, A. Fujioka, and T. Okamoto. 1999. An Improvement on a Practical Secret Voting Scheme. In Proc. of 2nd Int. Workshop on Info. Security (ISW '99). 225--234."},{"volume-title":"Advances in Cryptology - CRYPTO'91 (Lecture Notes in Computer Science)","author":"Pedersen T.","key":"e_1_3_2_1_52_1","unstructured":"T. Pedersen . 1992. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing . In Advances in Cryptology - CRYPTO'91 (Lecture Notes in Computer Science) , Vol. 576 . Springer Berlin \/ Heidelberg , 129--140. T. Pedersen. 1992. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Advances in Cryptology - CRYPTO'91 (Lecture Notes in Computer Science), Vol. 576. Springer Berlin \/ Heidelberg, 129--140."},{"key":"e_1_3_2_1_53_1","volume-title":"IAVoSS Workshop On Trustworthy Elections (WOTE","author":"Popoveniuc S.","year":"2006","unstructured":"S. Popoveniuc and B. Hosp . 2006. An introduction to Punchscan . In IAVoSS Workshop On Trustworthy Elections (WOTE 2006 ). 28--30. S. Popoveniuc and B. Hosp. 2006. An introduction to Punchscan. In IAVoSS Workshop On Trustworthy Elections (WOTE 2006). 28--30."},{"key":"e_1_3_2_1_54_1","volume-title":"Universally Verifiable Voting scheme. Seminar in Cryptology","author":"Radwin M.","year":"1995","unstructured":"M. Radwin . 1995. An Untraceable , Universally Verifiable Voting scheme. Seminar in Cryptology ( 1995 ). M. Radwin. 1995. An Untraceable, Universally Verifiable Voting scheme. Seminar in Cryptology (1995)."},{"key":"e_1_3_2_1_55_1","unstructured":"Certicom Research. 2010. SEC 2. Standards for Efficient Cryptography Group: Recommended Elliptic Curve Domain Parameters. (2010). Version 2.0.  Certicom Research. 2010. SEC 2. Standards for Efficient Cryptography Group: Recommended Elliptic Curve Domain Parameters. (2010). Version 2.0."},{"volume-title":"Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques (EUROCRYPT'95)","author":"Sako K.","key":"e_1_3_2_1_57_1","unstructured":"K. Sako and J. Kilian . 1995. Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth . In Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques (EUROCRYPT'95) . Springer-Verlag, Berlin, Heidelberg, 393--403. http:\/\/dl.acm.org\/citation.cfm?id=1755009.1755052 K. Sako and J. Kilian. 1995. Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth. In Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques (EUROCRYPT'95). Springer-Verlag, Berlin, Heidelberg, 393--403. http:\/\/dl.acm.org\/citation.cfm?id=1755009.1755052"},{"key":"e_1_3_2_1_58_1","volume-title":"Efficient Identification and Signatures for Smart Cards. In Advances in Cryptology - CRYPTO'89 Proceedings, G. Brassard (Ed.). Lecture Notes in Computer Science","volume":"435","author":"Schnorr C.-P.","year":"1990","unstructured":"C.-P. Schnorr . 1990 . Efficient Identification and Signatures for Smart Cards. In Advances in Cryptology - CRYPTO'89 Proceedings, G. Brassard (Ed.). Lecture Notes in Computer Science , Vol. 435 . Springer Berlin \/ Heidelberg, 239--252. C.-P. Schnorr. 1990. Efficient Identification and Signatures for Smart Cards. In Advances in Cryptology - CRYPTO'89 Proceedings, G. Brassard (Ed.). Lecture Notes in Computer Science, Vol. 435. Springer Berlin \/ Heidelberg, 239--252."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"B. Schoenmakers. 1999. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In CRYPTO. 148--164.  B. Schoenmakers. 1999. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In CRYPTO. 148--164.","DOI":"10.1007\/3-540-48405-1_10"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.001"},{"volume-title":"Annual Computer Security Applications Conference (ACSAC'09)","author":"Stark E.","key":"e_1_3_2_1_62_1","unstructured":"E. Stark , M. Hamburg , and D. Boneh . 2009. Symmetric cryptography in javascript . In Annual Computer Security Applications Conference (ACSAC'09) . IEEE, 373--381. E. Stark, M. Hamburg, and D. Boneh. 2009. Symmetric cryptography in javascript. In Annual Computer Security Applications Conference (ACSAC'09). IEEE, 373--381."},{"key":"e_1_3_2_1_63_1","volume-title":"EVT\/WOTE","volume":"1","author":"Tsoukalas G.","unstructured":"G. Tsoukalas , K. Papadimitriou , P. Louridas , and P. Tsanakas . 2013. From Helios to Zeus . In EVT\/WOTE , Vol. 1 . USENIX. G. Tsoukalas, K. Papadimitriou, P. Louridas, and P. Tsanakas. 2013. From Helios to Zeus. In EVT\/WOTE, Vol. 1. USENIX."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2034207"},{"key":"e_1_3_2_1_65_1","unstructured":"W3C. 2017. Web Cryptography API. (2017). https:\/\/www.w3.org\/TR\/WebCryptoAPI\/ [REC-WebCryptoAPI-20170126].  W3C. 2017. Web Cryptography API. (2017). https:\/\/www.w3.org\/TR\/WebCryptoAPI\/ [REC-WebCryptoAPI-20170126]."},{"key":"e_1_3_2_1_66_1","volume-title":"A Coercion-resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation. Master's thesis","author":"Weber S.","year":"2006","unstructured":"S. Weber . 2006. A Coercion-resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation. Master's thesis , Darmstadt University of Technology ( 2006 ). S. Weber. 2006. A Coercion-resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation. Master's thesis, Darmstadt University of Technology (2006)."},{"volume-title":"iElectronic voting by country. (2016). https:\/\/en.wikipedia.org\/wiki\/Electronic_voting_by_country [Online","year":"2016","key":"e_1_3_2_1_67_1","unstructured":"Wikipedia. 2016. iElectronic voting by country. (2016). https:\/\/en.wikipedia.org\/wiki\/Electronic_voting_by_country [Online ; accessed 21- Jun. - 2016 ]. Wikipedia. 2016. iElectronic voting by country. (2016). https:\/\/en.wikipedia.org\/wiki\/Electronic_voting_by_country [Online; accessed 21-Jun.-2016]."},{"volume-title":"Proc. of IEEE INFOCOM. 136--144","author":"Zou X.","key":"e_1_3_2_1_68_1","unstructured":"X. Zou , H. Li , Y. Sui , W. Peng , and F. Li . 2014. Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties . In Proc. of IEEE INFOCOM. 136--144 . X. Zou, H. Li, Y. Sui, W. Peng, and F. Li. 2014. Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties. In Proc. of IEEE INFOCOM. 136--144."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359804"}},"subtitle":["verifiable e-voting with long-term privacy"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":66,"alternative-id":["10.1145\/3359789.3359804","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359804","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}