{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:06:28Z","timestamp":1730297188662,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/smartiot49966.2020.00036","type":"proceedings-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:20:51Z","timestamp":1599772851000},"page":"190-196","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Privacy-Preserving Electronic Voting Scheme Based on Blockchain"],"prefix":"10.1109","author":[{"given":"Ze","family":"Xu","sequence":"first","affiliation":[]},{"given":"Sanxing","family":"Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"14","article-title":"E-voting system based on the Bitcoin protocol and blind signatures","volume":"10","author":"jason","year":"2017","journal-title":"Mathematical Modeling and its Applications"},{"key":"ref11","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc Theory Cryptogr Conf"},{"key":"ref12","article-title":"Basic techniques and composition theorems","author":"dwork","year":"2014","journal-title":"The Algorithmic Foundations of Differential Privacy"},{"key":"ref13","first-page":"180","article-title":"Receipt-freeness electronic voting scheme based on FOO voting protocol","volume":"42","author":"fen-fen","year":"2015","journal-title":"Computer Science"},{"key":"ref14","article-title":"A next-generation smart contract and decentralized application platform","author":"buterin","year":"2014","journal-title":"White Paper"},{"key":"ref15","first-page":"1177","article-title":"When machine learning meetsblockchain: A decentralized, privacy-preserving and secure design","author":"chen","year":"2018","journal-title":"Proc Int Conf"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_16"},{"key":"ref3","first-page":"1403","article-title":"Multiplicative homomorphic EVoting","volume":"334","author":"peng","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"ref6","first-page":"140","article-title":"The realization of key technology of electronic voting system based on Blockchain","volume":"39","author":"jing","year":"2018","journal-title":"Computer Engineering & Software"},{"key":"ref5","first-page":"1047","article-title":"An electronic voting scheme based on a new Mix Net","volume":"32","author":"hu-ming","year":"2004","journal-title":"Acta Electronica Sinica"},{"journal-title":"How to vote privately using Bitcoin","year":"2015","author":"zhao","key":"ref8"},{"key":"ref7","article-title":"China Blockchain technology and application development white paper","author":"ping","year":"2016","journal-title":"Ministry of Industry and Information Technology"},{"key":"ref2","article-title":"Research and implementation of highlyefficient anonymous electronic voting scheme based on ring signature and blind signature","author":"yao-jun","year":"2012","journal-title":"IEEE World Automation Congress"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDEG.2017.7962550"},{"key":"ref9","first-page":"123","article-title":"Electronic voting service using Block-chain","volume":"11","author":"lee","year":"2016","journal-title":"Journal of Digital Forensics Security and Law"}],"event":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","start":{"date-parts":[[2020,8,14]]},"location":"Beijing, China","end":{"date-parts":[[2020,8,16]]}},"container-title":["2020 IEEE International Conference on Smart Internet of Things (SmartIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9186568\/9191958\/09191989.pdf?arnumber=9191989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:21:48Z","timestamp":1657333308000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9191989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/smartiot49966.2020.00036","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}