{"id":"https://openalex.org/W4414100447","doi":"https://doi.org/10.1007/978-3-032-05036-6_4","title":"Threshold Receipt-Free Voting with\u00a0Server-Side Vote Validation","display_name":"Threshold Receipt-Free Voting with\u00a0Server-Side Vote Validation","publication_year":2025,"publication_date":"2025-09-10","ids":{"openalex":"https://openalex.org/W4414100447","doi":"https://doi.org/10.1007/978-3-032-05036-6_4"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-05036-6_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-05036-6_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032626172","display_name":"Thi Van Thao Doan","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Thi Van Thao Doan","raw_affiliation_strings":["UCLouvain \u2013 ICTEAM \u2013 Crypto Group, 1348, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"UCLouvain \u2013 ICTEAM \u2013 Crypto Group, 1348, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061506240","display_name":"Olivier Pereira","orcid":"https://orcid.org/0000-0002-1901-3587"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Olivier Pereira","raw_affiliation_strings":["UCLouvain \u2013 ICTEAM \u2013 Crypto Group, 1348, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"UCLouvain \u2013 ICTEAM \u2013 Crypto Group, 1348, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070278946","display_name":"Thomas Peters","orcid":"https://orcid.org/0000-0003-0835-6696"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Thomas Peters","raw_affiliation_strings":["UCLouvain \u2013 ICTEAM \u2013 Crypto Group, 1348, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"UCLouvain \u2013 ICTEAM \u2013 Crypto Group, 1348, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032626172"],"corresponding_institution_ids":["https://openalex.org/I95674353"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39664804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ballot","display_name":"Ballot","score":0.920799970626831},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.8691999912261963},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7071999907493591},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.652400016784668},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5726000070571899},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5622000098228455},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.5414999723434448}],"concepts":[{"id":"https://openalex.org/C2777094542","wikidata":"https://www.wikidata.org/wiki/Q905151","display_name":"Ballot","level":4,"score":0.920799970626831},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.8691999912261963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8529000282287598},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7071999907493591},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.652400016784668},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5726000070571899},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5623000264167786},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5622000098228455},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.5414999723434448},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5164999961853027},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4814000129699707},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42800000309944153},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4122999906539917},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2827000021934509},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C2778616913","wikidata":"https://www.wikidata.org/wiki/Q183398","display_name":"Bulletin board","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-032-05036-6_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-05036-6_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:dial.uclouvain.be:boreal:305223","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/305223","pdf_url":null,"source":{"id":"https://openalex.org/S4306400166","display_name":"Digital Access to Libraries","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800384882","host_organization_name":"Harris County Public Library","host_organization_lineage":["https://openalex.org/I2800384882"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lecture Notes in Computer Science, Vol. 16028, no.1, p. 55-72 (2025)","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.1007/978-3-032-05036-6_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-032-05036-6_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-032-05036-6_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1329855610","display_name":null,"funder_award_id":"project","funder_id":"https://openalex.org/F4320321390","funder_display_name":"Fonds De La Recherche Scientifique - FNRS"}],"funders":[{"id":"https://openalex.org/F4320321390","display_name":"Fonds De La Recherche Scientifique - FNRS","ror":"https://ror.org/03q83t159"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414100447.pdf","grobid_xml":"https://content.openalex.org/works/W4414100447.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W111294696","https://openalex.org/W1590713339","https://openalex.org/W2003593381","https://openalex.org/W2141395382","https://openalex.org/W2141420453","https://openalex.org/W2171228961","https://openalex.org/W2282463261","https://openalex.org/W2538237125","https://openalex.org/W3046356401","https://openalex.org/W4250314891","https://openalex.org/W4317928255","https://openalex.org/W4392306647","https://openalex.org/W4397048694","https://openalex.org/W4402716961"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2364011232","https://openalex.org/W2915320150","https://openalex.org/W1490898716","https://openalex.org/W2348360270","https://openalex.org/W1671466897","https://openalex.org/W3148326824","https://openalex.org/W3125363526"],"abstract_inverted_index":{"Abstract":[0],"Proving":[1],"the":[2,29,36,62,118,129,139],"validity":[3,33,63,115,165],"of":[4,10,38,50,64,97,113,142,153],"ballots":[5,119],"is":[6,43],"a":[7,24,51,73,94,110,121,151,211],"central":[8],"element":[9],"verifiable":[11],"elections.":[12],"Such":[13],"proofs":[14,34,220],"can":[15],"however":[16,77],"create":[17],"challenges":[18,30],"when":[19,83],"one":[20],"desires":[21],"to":[22,155,191,195,205,224],"make":[23],"protocol":[25],"receipt-free.":[26],"We":[27,92,145,202,216],"explore":[28],"raised":[31],"by":[32,45,66],"in":[35,101,227],"context":[37],"protocols":[39,148,209],"where":[40],"threshold":[41,98,212],"receipt-freeness":[42],"obtained":[44],"secret":[46],"sharing":[47],"an":[48],"encryption":[49],"vote":[52,200],"between":[53],"multiple":[54],"authorities.":[55],"In":[56],"such":[57],"contexts,":[58],"previous":[59,143],"solutions":[60],"verified":[61],"votes":[65,85,162],"decrypting":[67],"them":[68,71],"after":[69],"passing":[70],"through":[72],"mix-net.":[74],"This":[75],"approach":[76,96,127],"creates":[78],"subtle":[79],"privacy":[80,141],"risks,":[81],"especially":[82],"invalid":[84],"leak":[86],"structural":[87],"patterns":[88],"that":[89,149,160],"threaten":[90],"receipt-freeness.":[91],"propose":[93],"different":[95],"receipt-free":[99,213],"voting":[100,214],"which":[102,173,188],"authorities":[103],"re-randomize":[104],"ballot":[105,114,140],"shares":[106],"then":[107],"jointly":[108],"compute":[109],"ZK":[111],"proof":[112],"before":[116],"letting":[117],"enter":[120],"(possibly":[122],"homomorphic)":[123],"tallying":[124],"phase.":[125],"Our":[126],"keeps":[128],"voter":[130],"computational":[131],"costs":[132],"limited":[133],"while":[134],"offering":[135],"verifiability":[136],"and":[137,157,181,221],"improving":[138],"solutions.":[144],"present":[146],"two":[147,208],"enable":[150],"group":[152],"servers":[154],"verify":[156],"publicly":[158],"prove":[159],"encrypted":[161],"satisfy":[163],"some":[164],"properties:":[166],"$$\\textsf{MiniMix}$$":[167],"<mml:math":[168,183],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[169,184],"<mml:mi>MiniMix</mml:mi>":[170],"</mml:math>":[171,186],",":[172,187],"preserves":[174],"prior":[175],"voter-side":[176],"behavior":[177],"with":[178],"minimal":[179],"overhead,":[180],"$$\\textsf{HomoRand}$$":[182],"<mml:mi>HomoRand</mml:mi>":[185],"requires":[189],"voters":[190],"submit":[192],"auxiliary":[193],"data":[194],"facilitate":[196],"validation":[197],"over":[198],"large":[199],"domains.":[201],"show":[203],"how":[204],"use":[206],"our":[207,228],"within":[210],"framework.":[215],"provide":[217],"formal":[218],"security":[219],"efficiency":[222],"analyses":[223],"illustrate":[225],"trade-offs":[226],"designs.":[229]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
