{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T03:37:42Z","timestamp":1772941062030,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1145\/3773002.3774810","type":"proceedings-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T10:43:31Z","timestamp":1771584211000},"page":"213-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["(Semi-)Homomorphism as a Cure for The Inherent Weaknesses of Enveloping Protocols in eVoting?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5091-0807","authenticated-orcid":false,"given":"Domenica","family":"Bagnato","sequence":"first","affiliation":[{"name":"University of Economics and Business Vienna, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0415-3990","authenticated-orcid":false,"given":"Alexander","family":"Prosser","sequence":"additional","affiliation":[{"name":"University of Economics and Business Vienna, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"key":"e_1_3_3_2_1_2","doi-asserted-by":"crossref","unstructured":"Ronald L. Rivest Adi Shamir Leonard Adleman 1977. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. http:\/\/people.csail.mit.edu\/rivest\/Rsapaper.pdf","DOI":"10.21236\/ADA606588"},{"key":"e_1_3_3_2_2_2","unstructured":"Estonian National Electoral Committee. 2010. E-Voting System General Overview Tallinn. https:\/\/www.valimised.ee\/sites\/default\/files\/uploads\/eng\/General_Description_E-Voting_2010.pdf"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"David Chaum. 1981. Untraceable electronic mail return addresses and digital pseudonyms. In Communications of the ACM 4(2). https:\/\/www.freehaven.net\/anonbib\/cache\/chaum-mix.pdf","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.889687"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660315"},{"key":"e_1_3_3_2_6_2","volume-title":"Audit Report on Pilot Electronic Voting in Municipal Elections","author":"Karhum\u00e4ki Juhani","unstructured":"Juhani Karhum\u00e4ki, Tommi Meskanen. 2008. Audit Report on Pilot Electronic Voting in Municipal Elections, University of Turku, Turku."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.5817\/MUJLT2020-2-6"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00730-012-0043-6"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Federal Information Processing Standards. 2015. FIPS PUB 180-4 Secure Hash Standard (SHS). 10.6028\/NIST.FIPS.180-4","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3551504.3551519"},{"key":"e_1_3_3_2_11_2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. 2023. Technische Richtlinie TR-03162 Version 1.3. https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Technische-Richtlinien\/TR-nach-Thema-sortiert\/tr03162\/TR-03162_node.html"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Valeh Farzaliyev Calvin P\u00e4rn Heleen Saarse Jan Willemson. 2025. Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting. In Journal of Cryptology (2025)38:6 10.1007\/s00145-024-09530-5","DOI":"10.1007\/s00145-024-09530-5"},{"key":"e_1_3_3_2_15_2","volume-title":"Cryptology ePrint Archive","author":"Groth Jens","year":"2005","unstructured":"Jens Groth, Rafail Ostrovsky, Amit Sahai. 2005. Perfect Non-Interactive Zero Knowledge for NP. In Cryptology ePrint Archive, 2005(290). https:\/\/eprint.iacr.org\/2005\/290"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.401"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8_2"},{"key":"e_1_3_3_2_18_2","unstructured":"Pratibha Chaudhary Ritu Gupta Abhilasha Singh Pramathesh Majumder. 2019. Analysis and Comparison of Various Fully Homomorphic Encryption Techniques. In 2019 International Conference on Computing Power and Communication Technologies (GUCON). https:\/\/forms1.ieee.org\/rs\/682-UPB-550\/images\/Analysis_and_Comparison_of_Various_Fully_Homomorphic_Encryption_Techniques.pdf"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_293"}],"event":{"name":"CEEeGov 2025: Central and Eastern European eDem and eGov Days 2025","location":"Bucharest Romania","acronym":"CEEeGov 2025"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773002.3774810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T10:44:31Z","timestamp":1772880271000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773002.3774810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":19,"alternative-id":["10.1145\/3773002.3774810","10.1145\/3773002"],"URL":"https:\/\/doi.org\/10.1145\/3773002.3774810","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"2026-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}