{"id":"https://openalex.org/W4414101757","doi":"https://doi.org/10.1007/978-3-032-05036-6_5","title":"End-To-End Verifiable Internet Voting with\u00a0Partially Private Bulletin Boards","display_name":"End-To-End Verifiable Internet Voting with\u00a0Partially Private Bulletin Boards","publication_year":2025,"publication_date":"2025-09-10","ids":{"openalex":"https://openalex.org/W4414101757","doi":"https://doi.org/10.1007/978-3-032-05036-6_5"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-05036-6_5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-05036-6_5","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_5.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065759380","display_name":"Valeh Farzaliyev","orcid":"https://orcid.org/0009-0007-9513-9812"},"institutions":[{"id":"https://openalex.org/I4210160054","display_name":"Cybernetica (Estonia)","ror":"https://ror.org/054gqc795","country_code":"EE","type":"company","lineage":["https://openalex.org/I4210160054"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Valeh Farzaliyev","raw_affiliation_strings":["Cybernetica, Narva mnt 20, Tartu, 51009, Estonia"],"affiliations":[{"raw_affiliation_string":"Cybernetica, Narva mnt 20, Tartu, 51009, Estonia","institution_ids":["https://openalex.org/I4210160054"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063334840","display_name":"Jan Willemson","orcid":"https://orcid.org/0000-0002-6290-2099"},"institutions":[{"id":"https://openalex.org/I4210160054","display_name":"Cybernetica (Estonia)","ror":"https://ror.org/054gqc795","country_code":"EE","type":"company","lineage":["https://openalex.org/I4210160054"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Jan Willemson","raw_affiliation_strings":["Cybernetica, Narva mnt 20, Tartu, 51009, Estonia"],"affiliations":[{"raw_affiliation_string":"Cybernetica, Narva mnt 20, Tartu, 51009, Estonia","institution_ids":["https://openalex.org/I4210160054"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065759380"],"corresponding_institution_ids":["https://openalex.org/I4210160054"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39676504,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.7247999906539917},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7064999938011169},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6538000106811523},{"id":"https://openalex.org/keywords/coercion","display_name":"Coercion (linguistics)","score":0.6365000009536743},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5805000066757202},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.522599995136261},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.49320000410079956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8748999834060669},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.7247999906539917},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7064999938011169},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6538000106811523},{"id":"https://openalex.org/C2777188754","wikidata":"https://www.wikidata.org/wiki/Q5140822","display_name":"Coercion (linguistics)","level":2,"score":0.6365000009536743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.618399977684021},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5805000066757202},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.522599995136261},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.49320000410079956},{"id":"https://openalex.org/C2778616913","wikidata":"https://www.wikidata.org/wiki/Q183398","display_name":"Bulletin board","level":2,"score":0.4616999924182892},{"id":"https://openalex.org/C2777094542","wikidata":"https://www.wikidata.org/wiki/Q905151","display_name":"Ballot","level":4,"score":0.36579999327659607},{"id":"https://openalex.org/C153668964","wikidata":"https://www.wikidata.org/wiki/Q27636","display_name":"Majority rule","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2863999903202057},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2791000008583069},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26750001311302185},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2531999945640564},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-032-05036-6_5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-05036-6_5","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_5.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-032-05036-6_5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-05036-6_5","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_5.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2006669267","display_name":null,"funder_award_id":"PRG2177","funder_id":"https://openalex.org/F4320321090","funder_display_name":"Eesti Teadusagentuur"}],"funders":[{"id":"https://openalex.org/F4320321090","display_name":"Eesti Teadusagentuur","ror":"https://ror.org/00jjeja18"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414101757.pdf","grobid_xml":"https://content.openalex.org/works/W4414101757.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W7678451","https://openalex.org/W1619325103","https://openalex.org/W2013613544","https://openalex.org/W2067596507","https://openalex.org/W2138784757","https://openalex.org/W2290533330","https://openalex.org/W2293021588","https://openalex.org/W2477523090","https://openalex.org/W2545038363","https://openalex.org/W2968027060","https://openalex.org/W4379620268","https://openalex.org/W4385654123","https://openalex.org/W4401602366","https://openalex.org/W4403145917","https://openalex.org/W4404863636"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W296462677","https://openalex.org/W3108317354","https://openalex.org/W4297573717","https://openalex.org/W1596100069","https://openalex.org/W4283692793","https://openalex.org/W4321843854","https://openalex.org/W157440325","https://openalex.org/W2171932689"],"abstract_inverted_index":{"Abstract":[0],"In":[1,43],"2024,":[2],"Harrison":[3,91],"and":[4,24,35,50,85,92],"Haines":[5,93],"examined":[6],"the":[7,12,22,63,90,99,110],"applicability":[8],"of":[9,14,27,107],"STARKs":[10],"in":[11],"context":[13],"homomorphically":[15],"tallied":[16],"elections.":[17],"While":[18],"their":[19],"work":[20],"ensures":[21],"Recorded-as-Cast":[23],"Tallied-as-Recorded":[25],"properties":[26],"a":[28,39,103],"voting":[29,54],"system,":[30],"it":[31],"lacks":[32],"Cast-as-Intended":[33],"verification":[34,60],"does":[36],"not":[37],"provide":[38,86],"coercion":[40,67],"mitigation":[41],"mechanism.":[42],"this":[44],"work,":[45],"we":[46],"address":[47],"these":[48],"challenges":[49],"propose":[51],"an":[52],"updated":[53],"protocol":[55,84],"that":[56],"achieves":[57],"all":[58],"three":[59],"properties,":[61],"at":[62],"same":[64,111],"time":[65],"providing":[66],"resistance":[68],"by":[69],"allowing":[70,101],"re-voting.":[71],"Our":[72,95],"approach":[73,96],"leverages":[74],"vector":[75],"commitment":[76],"schemes":[77],"with":[78],"update":[79],"mechanisms.":[80],"We":[81],"implement":[82],"our":[83],"comparative":[87],"benchmarks":[88],"to":[89],"solution.":[94],"significantly":[97],"outperforms":[98],"latter,":[100],"processing":[102],"considerably":[104],"larger":[105],"number":[106],"votes":[108],"within":[109],"hardware":[112],"limits.":[113]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
