[HTML][HTML] A review of cryptographic electronic voting

YX Kho, SH Heng, JJ Chin - Symmetry, 2022 - mdpi.com
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …

An overview of end-to-end verifiable voting systems

ST Ali, J Murray - Real-world electronic voting, 2016 - taylorfrancis.com
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …

How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios

D Bernhard, O Pereira, B Warinschi - … on the Theory and Application of …, 2012 - Springer
Abstract The Fiat-Shamir transformation is the most efficient construction of non-interactive
zero-knowledge proofs. This paper is concerned with two variants of the transformation that …

SoK: A comprehensive analysis of game-based ballot privacy definitions

D Bernhard, V Cortier, D Galindo… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We critically survey game-based security definitions for the privacy of voting schemes. In
addition to known limitations, we unveil several previously unnoticed shortcomings …

Attacking and fixing Helios: An analysis of ballot secrecy

V Cortier, B Smyth - Journal of Computer Security, 2013 - journals.sagepub.com
Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system,
suitable for use in low-coercion environments. In this article, we analyse ballot secrecy in …

Election verifiability for helios under weaker trust assumptions

V Cortier, D Galindo, S Glondu… - … Security-ESORICS 2014 …, 2014 - Springer
Most electronic voting schemes aim at providing verifiability: voters should trust the result
without having to rely on some authorities. Actually, even a prominent voting system like …

End-to-end verifiable elections in the standard model

A Kiayias, T Zacharias, B Zhang - … on the Theory and Applications of …, 2015 - Springer
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-
to-end verifiable in the standard model, ie, without any additional “setup” assumption or …

[KIRJA][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016 - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …

On CCA-secure somewhat homomorphic encryption

J Loftus, A May, NP Smart, F Vercauteren - Selected Areas in …, 2012 - Springer
It is well known that any encryption scheme which supports any form of homomorphic
operation cannot be secure against adaptive chosen ciphertext attacks. The question then …

Election verifiability or ballot privacy: Do we need to choose?

E Cuvelier, O Pereira, T Peters - … Security, Egham, UK, September 9-13 …, 2013 - Springer
We propose a new encryption primitive, commitment consistent encryption (CCE), and
instances of this primitive that enable building the first universally verifiable voting schemes …