{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:11Z","timestamp":1725467651460},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540645184"},{"type":"electronic","value":"9783540697954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0054144","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T05:13:04Z","timestamp":1153977184000},"page":"437-447","source":"Crossref","is-referenced-by-count":92,"title":["Universally verifiable mix-net with verification work independent of the number of mix-servers"],"prefix":"10.1007","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,25]]},"reference":[{"key":"32_CR1","unstructured":"R. Alton-Scheidl, R. Schmutzer, P.-P. Sint, and G. Tscherteu. Voting and rating. Technical report, Research Unit for Socio-Economics, 1997."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"J. Benaloh and D. Tuinstra. Receipt-free secret-ballot elections. In 26th STOC, pages 544\u2013553, 1994.","DOI":"10.1145\/195058.195407"},{"issue":"22","key":"32_CR3","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1049\/el:19911240","volume":"27","author":"C. Boyd","year":"1991","unstructured":"C. Boyd. Multisignatures based on zero knowledge schemes. Electronics Letters, 27(22):2002\u20132004, 1991.","journal-title":"Electronics Letters"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"S. Brands. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT'97, volume 1233 of LNCS, pages 318\u2013333. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_22"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return address, and digital pseudonyms. In Communications of the ACM, volume 24, pages 84\u201388, 1981.","journal-title":"Communications of the ACM"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum. Elections with unconditionally-secret ballots and disruptions equivalent to breaking RSA. In EUROCRYPT '88, volume 330 of LNCS, pages 177\u2013182. Springer-Verlag, 1988.","DOI":"10.1007\/3-540-45961-8_15"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"J. Cohen and M. Fischer. A robust and verifiable cryptographically secure election scheme. In Proceedings of the 26th IEEE Symposium on Foundations of Computer Science, pages 372\u2013382. IEEE Computer Society, 1985.","DOI":"10.1109\/SFCS.1985.2"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung. Multi-authority secret-ballot elections with linear work. In EUROCRYPT '96, volume 1070 of LNCS, pages 72\u201383. Springer-Verlag, 1996.","DOI":"10.1007\/3-540-68339-9_7"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In EUROCRYPT'97, volume 1233 of LNCS, pages 103\u2013118. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-69053-0_9"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In AUSCRYPT'92, volume 718 of LNCS, pages 244\u2013251. Springer-Verlag, 1993.","DOI":"10.1007\/3-540-57220-1_66"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson. A practical mix. In EUROCRYPT '98, 1998.","DOI":"10.1007\/BFb0054145"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"M. Michels and P. Horster. On the risk of disruption in several multiparty signature schemes. In ASIACRYPT'96, volume 1163 of LNCS, pages 334\u2013345. Springer-Verlag, 1996.","DOI":"10.1007\/BFb0034859"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"M. Michels and P. Horster. Some remarks on a receipt-free and universally verifiable mix-type voting scheme. In ASIACRYPT'96, volume 1163 of LNCS, pages 125\u2013132. Springer-Verlag, 1996.","DOI":"10.1007\/BFb0034841"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"W. Ogata, K. Kurosawa, K. Sako, and K. Takatani. Fault tolerant anonymous channel. In ICICS98, 1997. To appear.","DOI":"10.1007\/BFb0028500"},{"key":"32_CR15","unstructured":"K. Ohta and T. Okamoto. The exact security of multi-signature schemes. Technical Report ISEC97-27, IEICE, July 1997."},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all\/nothing election scheme. In EUROCRYPT '93, volume 765 of LNCS, pages 248\u2013259. Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48285-7_21"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann. Breaking an efficient anonymous channel. In EUROCRYPT '94, volume 950 of LNCS, pages 339\u2013348. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0053448"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"K. Sako. An improved universally verifiable mix-type voting schemes. Unpublished Manuscript, 1995.","DOI":"10.1007\/3-540-49264-X_32"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"K. Sako and J. Kilian. Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth-. In EUROCRYPT '95, volume 921 of LNCS, pages 393\u2013403. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-49264-X_32"},{"issue":"3","key":"32_CR20","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239\u2013252, 1991.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT'98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0054144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T04:36:47Z","timestamp":1555735007000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0054144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645184","9783540697954"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/bfb0054144","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}