{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:50:08Z","timestamp":1746845408006},"reference-count":20,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.1587\/transinf.2020bdp0001","type":"journal-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T22:15:05Z","timestamp":1627769705000},"page":"1163-1171","source":"Crossref","is-referenced-by-count":1,"title":["A Fast Algorithm for Liquid Voting on Blockchain"],"prefix":"10.1587","volume":"E104.D","author":[{"given":"Xiaoping","family":"ZHOU","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, The University of Aizu"}]},{"given":"Peng","family":"LI","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of Aizu"}]},{"given":"Yulong","family":"ZENG","sequence":"additional","affiliation":[{"name":"Beijing YeeZTech Co., Ltd."}]},{"given":"Xuepeng","family":"FAN","sequence":"additional","affiliation":[{"name":"Beijing YeeZTech Co., Ltd."}]},{"given":"Peng","family":"LIU","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Hangzhou Dianzi University"}]},{"given":"Toshiaki","family":"MIYAZAKI","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, The University of Aizu"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] C. Catalini and J.S. Gans, \u201cSome simple economics of the blockchain,\u201d tech. rep., National Bureau of Economic Research, 2016. 10.3386\/w22952","DOI":"10.3386\/w22952"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] C. Peng, C. Wu, L. Gao, J. Zhang, K.-L. Alvin Yau, and Y. Ji, \u201cBlockchain for vehicular internet of things: Recent advances and open issues,\u201d Sensors, vol.20, no.18, p.5079, 2020. 10.3390\/s20185079","DOI":"10.3390\/s20185079"},{"key":"3","unstructured":"[3] B. Cammaerts, \u201cRevalidating participation: power and pre-figurative politics within contemporary leftwing movements,\u201d 2019."},{"key":"4","unstructured":"[4] L. Carroll, The Principles of Parliamentary Representation, Harrison and Sons, 1884."},{"key":"5","unstructured":"[5] W.S. U&apos;Ren, \u201cGovernment by proxy now,\u201d New York Times, 1912."},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] J.C. Miller, \u201cA program for direct and proxy voting in the legislative process,\u201d Public choice, vol.7, no.1, pp.107-113, 1969. 10.1007\/bf01718736","DOI":"10.1007\/BF01718736"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] A. Paulin, \u201cThrough liquid democracy to sustainable non-bureaucratic government,\u201d Proc. Int. Conf. for E-Democracy and Open Government, pp.205-217, 2014. 10.29379\/jedem.v6i2.298","DOI":"10.29379\/jedem.v6i2.298"},{"key":"8","unstructured":"[8] S. Hardt and L.C. Lopes, \u201cGoogle votes: a liquid democracy experiment on a corporate social network,\u201d 2015."},{"key":"9","unstructured":"[9] J. Behrens, A. Kistner, A. Nitsche, and B. Swierczek, The principles of LiquidFeedback, Interaktive Demokratie e. V. Berlin, 2014."},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] F. Hao, P.Y. Ryan, and P. Zieli\u0144ski, \u201cAnonymous voting by two-round public discussion,\u201d IET Information Security, vol.4, no.2, pp.62-67, 2010. 10.1049\/iet-ifs.2008.0127","DOI":"10.1049\/iet-ifs.2008.0127"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] C. Blum and C.I. Zuber, \u201cLiquid democracy: Potentials, problems, and perspectives,\u201d Journal of Political Philosophy, vol.24, no.2, pp.162-182, 2016. 10.1111\/jopp.12065","DOI":"10.1111\/jopp.12065"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] R. Hanifatunnisa and B. Rahardjo, \u201cBlockchain based e-voting recording system design,\u201d 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA), pp.1-6, IEEE, 2017. 10.1109\/tssa.2017.8272896","DOI":"10.1109\/TSSA.2017.8272896"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] F.P. Hjalmarsson, G.K. Hreiarsson, M. Hamdaqa, and G. Hjalmtysson, \u201cBlockchain-based e-voting system,\u201d 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp.983-986, IEEE, 2018. 10.1109\/cloud.2018.00151","DOI":"10.1109\/CLOUD.2018.00151"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] A. Kiayias and M. Yung, \u201cSelf-tallying elections and perfect ballot secrecy,\u201d International Workshop on Public Key Cryptography, vol.2274, pp.141-158, Springer, 2002. 10.1007\/3-540-45664-3_10","DOI":"10.1007\/3-540-45664-3_10"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] X. Yang, X. Yi, S. Nepal, and F. Han, \u201cDecentralized voting: a self-tallying voting system using a smart contract on the ethereum blockchain,\u201d International Conference on Web Information Systems Engineering, vol.11233, pp.18-35, Springer, 2018. 10.1007\/978-3-030-02922-7_2","DOI":"10.1007\/978-3-030-02922-7_2"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] P. McCorry, S.F. Shahandashti, and F. Hao, \u201cA smart contract for boardroom voting with maximum voter privacy,\u201d International Conference on Financial Cryptography and Data Security, pp.357-375, Springer, 2017. 10.1007\/978-3-319-70972-7_20","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] M. Schulze, \u201cA new monotonic, clone-independent, reversal symmetric, and condorcet-consistent single-winner election method,\u201d Social Choice and Welfare, vol.36, no.2, pp.267-303, 2011. 10.1007\/s00355-010-0475-4","DOI":"10.1007\/s00355-010-0475-4"},{"key":"18","unstructured":"[18] G. Becker, \u201cMerkle signature schemes, merkle trees and their cryptanalysis,\u201d Ruhr-University Bochum, Tech. Rep, 2008."},{"key":"19","unstructured":"[19] K. Mulmuley, \u201cComputational geometry,\u201d An Introduction Through Randomized Algorithms. Prentice-Hall, 1994."},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] X. Wang, F. Jiang, L. Zhong, Y. Ji, S. Yamada, K. Takano, and G. Xue, \u201cIntelligent post-disaster networking by exploiting crowd big data,\u201d IEEE Network, vol.34, no.4, pp.49-55, 2020. 10.1109\/mnet.011.1900389","DOI":"10.1109\/MNET.011.1900389"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/8\/E104.D_2020BDP0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,7]],"date-time":"2021-08-07T06:08:13Z","timestamp":1628316493000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/8\/E104.D_2020BDP0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2020bdp0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,1]]},"article-number":"2020BDP0001"}}