{"id":"https://openalex.org/W4226455603","doi":"https://doi.org/10.1109/tcss.2022.3162869","title":"PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy","display_name":"PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy","publication_year":2022,"publication_date":"2022-04-12","ids":{"openalex":"https://openalex.org/W4226455603","doi":"https://doi.org/10.1109/tcss.2022.3162869"},"language":"en","primary_location":{"id":"doi:10.1109/tcss.2022.3162869","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3162869","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043313305","display_name":"Siqi Lu","orcid":"https://orcid.org/0000-0002-8593-9636"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Siqi Lu","raw_affiliation_strings":["Key Laboratory of Network Cryptography Technology of Henan, Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Cryptography Technology of Henan, Information Engineering University, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022409306","display_name":"Zhaoxuan Li","orcid":"https://orcid.org/0000-0002-2195-0799"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoxuan Li","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076016246","display_name":"Xuyang Miao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuyang Miao","raw_affiliation_strings":["Key Laboratory of Network Cryptography Technology of Henan, Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Cryptography Technology of Henan, Information Engineering University, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042045058","display_name":"Qingdi Han","orcid":"https://orcid.org/0009-0009-0179-9399"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingdi Han","raw_affiliation_strings":["Department of Information Science and Engineering, School of Computer Science, Ocean University of China, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, School of Computer Science, Ocean University of China, Qingdao, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102448774","display_name":"Zheng Jianhua","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Zheng","raw_affiliation_strings":["Department of Information Technology, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043313305"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4588,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84398586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"10","issue":"3","first_page":"1039","last_page":"1056"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6982430219650269},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6531329154968262},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6366918087005615},{"id":"https://openalex.org/keywords/ballot","display_name":"Ballot","score":0.5955288410186768},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.5222707390785217},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.5218538045883179},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5139836668968201},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4765268564224243},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4739163815975189},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.45826229453086853},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4496869146823883},{"id":"https://openalex.org/keywords/polling","display_name":"Polling","score":0.4455842077732086},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3309018015861511},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3219935894012451},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10806646943092346}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6982430219650269},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6531329154968262},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6366918087005615},{"id":"https://openalex.org/C2777094542","wikidata":"https://www.wikidata.org/wiki/Q905151","display_name":"Ballot","level":4,"score":0.5955288410186768},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.5222707390785217},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.5218538045883179},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5139836668968201},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4765268564224243},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4739163815975189},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.45826229453086853},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4496869146823883},{"id":"https://openalex.org/C204854418","wikidata":"https://www.wikidata.org/wiki/Q1362921","display_name":"Polling","level":2,"score":0.4455842077732086},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3309018015861511},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3219935894012451},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10806646943092346},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcss.2022.3162869","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3162869","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4735193301","display_name":null,"funder_award_id":"Z191100007119006","funder_id":"https://openalex.org/F4320325902","funder_display_name":"Beijing Municipal Science and Technology Commission"},{"id":"https://openalex.org/G5948022774","display_name":null,"funder_award_id":"61872381","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6487752525","display_name":null,"funder_award_id":"62172405","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320325902","display_name":"Beijing Municipal Science and Technology Commission","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W40134741","https://openalex.org/W146244851","https://openalex.org/W1550614890","https://openalex.org/W1566341302","https://openalex.org/W1801919455","https://openalex.org/W1888364621","https://openalex.org/W1979005992","https://openalex.org/W2056489112","https://openalex.org/W2100464161","https://openalex.org/W2104188387","https://openalex.org/W2105564033","https://openalex.org/W2139368309","https://openalex.org/W2264079072","https://openalex.org/W2592516822","https://openalex.org/W2768174108","https://openalex.org/W2787998876","https://openalex.org/W2807993682","https://openalex.org/W2808089427","https://openalex.org/W2886853612","https://openalex.org/W2897581105","https://openalex.org/W2902021258","https://openalex.org/W2903536544","https://openalex.org/W2945088561","https://openalex.org/W2963336394","https://openalex.org/W2964873914","https://openalex.org/W2965254664","https://openalex.org/W2966333273","https://openalex.org/W2966448722","https://openalex.org/W2966577458","https://openalex.org/W2977008071","https://openalex.org/W2983279260","https://openalex.org/W2997628228","https://openalex.org/W3002744748","https://openalex.org/W3008075714","https://openalex.org/W3014732532","https://openalex.org/W3033686777","https://openalex.org/W3034246660","https://openalex.org/W3037299667","https://openalex.org/W3043878462","https://openalex.org/W3046686045","https://openalex.org/W3114221980","https://openalex.org/W3143159859","https://openalex.org/W3163664856","https://openalex.org/W3193273449","https://openalex.org/W4206909066","https://openalex.org/W4296288933","https://openalex.org/W6601589750","https://openalex.org/W6605925781","https://openalex.org/W6634077731","https://openalex.org/W6638544733","https://openalex.org/W6639339326","https://openalex.org/W6675872267","https://openalex.org/W6745940941","https://openalex.org/W6752294341","https://openalex.org/W6765817336","https://openalex.org/W6800316382"],"related_works":["https://openalex.org/W2160708112","https://openalex.org/W4285182480","https://openalex.org/W3044910261","https://openalex.org/W3185631915","https://openalex.org/W2065670687","https://openalex.org/W2019613772","https://openalex.org/W2363140998","https://openalex.org/W2111822953","https://openalex.org/W2997530193","https://openalex.org/W4232734098"],"abstract_inverted_index":{"This":[0,146,257],"article":[1],"proposes":[2],"private":[3],"intersection":[4,13,30,56],"weighted":[5,14,44,70,98,208,331],"sum":[6,15,45],"(PIWS),":[7],"a":[8],"scalable,":[9],"fair,":[10],"and":[11,17,39,101,125,138,164,199,231,265,268,309,339,355,382,384],"privacy-preserving":[12,97],"protocol":[16,25,91,304,322,333,360],"applies":[18],"it":[19,107,232],"to":[20,212,365,373,389],"voting":[21,99,136,172,189,214,222,230,332,348,375],"scenarios.":[22],"The":[23,89,341],"PIWS":[24,90,370],"can":[26,40,66,385],"privately":[27,41],"calculate":[28,42],"the":[29,43,47,51,55,59,62,69,86,96,122,132,150,154,171,197,203,207,213,217,221,226,229,237,242,244,247,251,255,260,269,286,292,299,303,306,311,316,326,346,359,362],"of":[31,46,54,61,85,135,153,206,228,236,241,246,253,262,294,302,328,345,352,379,392,397],"identity":[32,52,80],"index":[33,81],"sets":[34],"maintained":[35],"by":[36],"each":[37,184],"participant":[38],"data":[48,84,157],"associated":[49,83],"with":[50,149,280],"indexes":[53],"set.":[57],"After":[58,219],"execution":[60],"protocol,":[63,296],"both":[64],"parties":[65],"only":[67,130,224,324],"know":[68],"sum,":[71],"but":[72,144,334],"not":[73,109,323],"any":[74,79],"additional":[75],"information,":[76,267],"such":[77],"as":[78,111,116],"or":[82,174,239,249,278,282,400],"other":[87,117],"party.":[88],"is":[92,147,186,191,210,336,371],"very":[93],"suitable":[94],"for":[95,180],"scenarios":[100],"has":[102,233],"three":[103],"novel":[104],"characteristics.":[105],"First,":[106],"does":[108],"require":[110],"many":[112],"semitrusted":[113],"tally":[114],"clerks":[115],"protocols,":[118],"which":[119],"greatly":[120],"reduces":[121],"deployment,":[123],"communication,":[124,353],"calculation":[126,356],"costs":[127],"involved.":[128],"It":[129],"requires":[131],"distributed":[133],"deployment":[134,151],"servers":[137,140],"weight":[139],"that":[141,358],"are":[142,167],"honest":[143],"curious.":[145],"consistent":[148],"framework":[152],"future":[155],"big":[156],"application":[158],"backgrounds.":[159],"Second,":[160],"perfect":[161],"privacy":[162,245,264],"protection":[163],"ballot":[165,185,266,283],"secrecy":[166],"achieved.":[168],"That":[169],"is,":[170],"terminal":[173],"polling":[175],"station":[176],"provides":[177],"encryption":[178],"services":[179],"ballots":[181],"immediately":[182],"after":[183],"cast.":[187],"All":[188],"information":[190,284],"then":[192],"expressed":[193],"in":[194,216,350,377,402],"ciphertext":[195,270],"throughout":[196],"weighting":[198],"counting":[200,254,287],"processes,":[201],"until":[202],"final":[204],"result":[205],"vote":[209],"passed":[211],"server":[215,223],"ciphertext.":[218],"decryption,":[220],"knows":[225],"results":[227,344],"no":[234],"knowledge":[235],"content":[238],"preference":[240],"ballots,":[243],"voters,":[248],"even":[250],"process":[252],"votes.":[256],"design":[258],"avoids":[259],"disclosure":[261],"voter":[263,281],"form":[271],"also":[272,335],"prevents":[273],"malicious":[274],"users":[275],"from":[276],"cheating":[277],"tampering":[279],"during":[285],"process.":[288],"To":[289],"better":[290],"explain":[291],"security":[293,301],"our":[295,321],"we":[297],"present":[298],"provable":[300],"under":[305],"honest-but-curious":[307],"model":[308,390],"show":[310,357],"formal":[312],"verification":[313],"obtained":[314],"using":[315],"Tamarin":[317],"prover":[318],"software.":[319],"Third,":[320],"achieves":[325],"function":[327],"an":[329],"optional":[330],"relatively":[337],"lightweight":[338],"efficient.":[340],"efficiency":[342],"analysis":[343],"deployed":[347],"system":[349],"terms":[351,378],"storage,":[354],"meets":[361],"requirements":[363],"applicable":[364],"real-world":[366],"applications.":[367],"In":[368],"summary,":[369],"superior":[372],"existing":[374],"protocols":[376],"function,":[380],"security,":[381],"efficiency,":[383],"be":[386],"harmoniously":[387],"applied":[388],"updating":[391],"federated":[393],"learning,":[394],"consensus":[395],"building":[396],"blockchain":[398],"systems,":[399],"decision-making":[401],"artificial":[403],"intelligence.":[404]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
