{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:23Z","timestamp":1750309523961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Japan Society for Promotion of Science","award":["JP22K12029"],"award-info":[{"award-number":["JP22K12029"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3702359.3702368","type":"proceedings-article","created":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T07:43:51Z","timestamp":1737186231000},"page":"62-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Extending the Mechanism for Preventing Fraud in Polling Stations to Electronic Voting Schemes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2843-2484","authenticated-orcid":false,"given":"Yoshifumi","family":"Ueshige","sequence":"first","affiliation":[{"name":"Center for Information and Communication Technology, Nagasaki University, Nagasaki, Japan,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4621-1674","authenticated-orcid":false,"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan,"}]}],"member":"320","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"e_1_3_3_1_1_2","first-page":"315","volume-title":"Individual Verifiability and Revoting in the Estonian Internet Voting System. In Financial Cryptography and Data Security. FC 2022 International Workshops","author":"Pereira Olivier","year":"2022","unstructured":"Olivier Pereira. 2022. Individual Verifiability and Revoting in the Estonian Internet Voting System. In Financial Cryptography and Data Security. FC 2022 International Workshops pp 315-324."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195407"},{"key":"e_1_3_3_1_3_2","first-page":"223","article-title":"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes","volume":"1999","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT 1999, pp. 223-238.","journal-title":"EUROCRYPT"},{"issue":"5","key":"e_1_3_3_1_4_2","first-page":"694","article-title":"Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption","volume":"19","author":"Jabbar Ihsan","year":"2017","unstructured":"Ihsan Jabbar and Saad Najim Alsaad. 2017. Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption. International Journal of Network Security, Vol.19, No.5, pp.694-703.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_3_1_5_2","first-page":"393","article-title":"Receipt-Free Mix-Type Voting Scheme-A practical solution to the implementation of a voting booth-. Advances in Cryptology -EUROCRYPT '95","volume":"921","author":"Sako Kazue","year":"1995","unstructured":"Kazue Sako and Joe Kilian,1995. Receipt-Free Mix-Type Voting Scheme-A practical solution to the implementation of a voting booth-. Advances in Cryptology -EUROCRYPT '95, LNCS 921, pp. 393-403.","journal-title":"LNCS"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24691-6_19"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616683"},{"key":"e_1_3_3_1_8_2","first-page":"1","volume-title":"2018 6th International Symposium on Digital Forensic and Security","author":"Yavuz Emre","unstructured":"Emre Yavuz, Ali Kaan Ko\u00e7, Umut Can \u00c7abuk and G\u00f6khan Dalk\u0131l\u0131\u00e7. 2018. Towards Secure E-Voting Using Ethereum Blockchain, In 2018 6th International Symposium on Digital Forensic and Security, pp. 1-7."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1911\/1\/012001"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.21276\/ijircst.2021.9.2.14"},{"key":"e_1_3_3_1_11_2","volume-title":"Disproving coercion resistance in some e-voting schemes, or power of physical voting booth (Japanese) In Computer Security Symposium","author":"Sakurai Kouichi","year":"2023","unstructured":"Kouichi Sakurai and Yoshifumi Ueshige. 2023. Disproving coercion resistance in some e-voting schemes, or power of physical voting booth (Japanese) In Computer Security Symposium 2023, 1E4-2."},{"key":"e_1_3_3_1_12_2","first-page":"156","volume-title":"Asahi Shinbunsha","author":"Aoki Yuji","year":"1999","unstructured":"Yuji Aoki. 1999. Naniwa shihon-ron (Naniwa capital theory) (Japanese), Asahi Shinbunsha, pp. 156-159."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103165"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3208"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3002728"},{"key":"e_1_3_3_1_16_2","unstructured":"InfoCom Research Inc. 2023. Summary of the Report of the Research and Study Project on Technical Verification and Operation of the Internet Voting System for Overseas Election (Japanese) Ministry of Internal Affairs and Communications Japan (Cited 2023-12-09) https:\/\/ www.soumu.go.jp\/main_content\/000904096.pdf."}],"event":{"name":"AIBC '24: 2024 5th International Artificial Intelligence and Blockchain Conference","acronym":"AIBC '24","location":"Tokyo Japan"},"container-title":["Proceedings of the 2024 5th International Artificial Intelligence and Blockchain Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702359.3702368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702359.3702368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:09Z","timestamp":1750295889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702359.3702368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":16,"alternative-id":["10.1145\/3702359.3702368","10.1145\/3702359"],"URL":"https:\/\/doi.org\/10.1145\/3702359.3702368","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2025-01-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}