{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:48:35Z","timestamp":1755802115715,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3650400.3650517","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T08:33:18Z","timestamp":1713342798000},"page":"704-708","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure electronic Voting Protocol Base on Threshold Proof"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9457-7661","authenticated-orcid":false,"given":"Weitao","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer and Artificial Intelligence, Zhengzhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6319-5672","authenticated-orcid":false,"given":"Jiangfeng","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Zhengzhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5879-3539","authenticated-orcid":false,"given":"Shiqi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Zhengzhou University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_66"},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"260","volume":"19","author":"Yuan Lifeng","year":"2017","unstructured":"Lifeng Yuan, Mingchu Li, Cheng Guo, A Verifiable E-voting Scheme with Secret Sharing [J]. International Journal of Network Security, 2017, 19(2): 260-271.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"volume-title":"AFIPS 1979 Nation Computer Conference. 1979: 313-317","author":"BLAKLEY","key":"e_1_3_2_1_5_1","unstructured":"BLAKLEY G. Safeguarding cryptographic key [C]. AFIPS 1979 Nation Computer Conference. 1979: 313-317."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_7_1","volume-title":"A public key cryptosystem and a signature scheme based on discrete logarithms [J]","author":"Taher ElGamal","year":"1985","unstructured":"ElGamal Taher. A public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE transactions on information theory, 1985, 31(4): 469-472."},{"volume-title":"Proceedings of the nineteenth annual ACM symposium on Theory of computing. 1987: 210-217","author":"Fiege","key":"e_1_3_2_1_8_1","unstructured":"Fiege U, Fiat A, Shamir A. Zero knowledge proofs of identity [C]. Proceedings of the nineteenth annual ACM symposium on Theory of computing. 1987: 210-217."},{"key":"e_1_3_2_1_9_1","volume-title":"Conference on the theory and application of cryptographic techniques.","author":"Fiat","year":"1986","unstructured":"Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems [C]. Conference on the theory and application of cryptographic techniques. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986: 186-194."},{"key":"e_1_3_2_1_10_1","volume-title":"Efficient proofs of knowledge for threshold relations [C]. European Symposium on Research in Computer Security","author":"Avitabile","year":"2022","unstructured":"Avitabile G, Botta V, Friolo D, Efficient proofs of knowledge for threshold relations [C]. European Symposium on Research in Computer Security. Cham: Springer Nature Switzerland, 2022: 42-62."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1529931"},{"key":"e_1_3_2_1_12_1","volume-title":"Monte Carlo methods for index computation (modp) [J]. Mathematics of computation","author":"Pollard J","year":"1978","unstructured":"Pollard J M. Monte Carlo methods for index computation (modp) [J]. Mathematics of computation, 1978, 32(143): 918-924."}],"event":{"name":"EITCE 2023: 2023 7th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650400.3650517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:09:21Z","timestamp":1755752961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":12,"alternative-id":["10.1145\/3650400.3650517","10.1145\/3650400"],"URL":"https:\/\/doi.org\/10.1145\/3650400.3650517","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}