Verifiability, privacy, and coercion-resistance: New insights from a case study
R Küsters, T Truderung, A Vogt - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
In this paper, we present new insights into central properties of voting systems, namely
verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the …
verifiability, privacy, and coercion-resistance. We demonstrate that the combination of the …
A game-based definition of coercion resistance and its applications
R Küsters, T Truderung, A Vogt - Journal of Computer Security, 2012 - content.iospress.com
Coercion resistance is one of the most important and intricate security requirements for
voting protocols. Several definitions of coercion resistance have been proposed in the …
voting protocols. Several definitions of coercion resistance have been proposed in the …
Study on poll-site voting and verification systems
Voting is an important part of the democratic process. The electorate makes a decision or
expresses an opinion that is accepted by everyone. However, some individual or group may …
expresses an opinion that is accepted by everyone. However, some individual or group may …
Cryptographic security analysis of e-voting systems: Achievements, misconceptions, and limitations
R Küsters, J Müller - … Voting: Second International Joint Conference, E …, 2017 - Springer
Rigorous cryptographic security analysis plays an important role in the design of modern e-
voting systems by now. There has been huge progress in this field in the last decade or so in …
voting systems by now. There has been huge progress in this field in the last decade or so in …
A formal analysis of the Norwegian E-voting protocol
V Cortier, C Wiedling - Principles of Security and Trust: First International …, 2012 - Springer
Norway has used e-voting in its last political election in September 2011, with more than 25
000 voters using the e-voting option. The underlying protocol is a new protocol designed by …
000 voters using the e-voting option. The underlying protocol is a new protocol designed by …
Measuring vote privacy, revisited
We propose a new measure for privacy of votes. Our measure relies on computational
conditional entropy, an extension of the traditional notion of entropy that incorporates both …
conditional entropy, an extension of the traditional notion of entropy that incorporates both …
Rethinking voter coercion: The realities imposed by technology
J Benaloh - … Electronic Voting Technology Workshop/Workshop on …, 2013 - usenix.org
When the Australian secret ballot was introduced in the 1850s, it not only provided privacy
for those voters who wanted it, but it also effectively eliminated coercion by allowing no …
for those voters who wanted it, but it also effectively eliminated coercion by allowing no …
[PDF][PDF] Scantegrity {III}: Automatic Trustworthy Receipts, Highlighting {Over/Under} Votes, and Full Voter Verifiability
Building on lessons learned from the November 2009 Scantegrity II election in Takoma Park,
MD, we propose improvements to the Scantegrity II voting system that (1) automatically print …
MD, we propose improvements to the Scantegrity II voting system that (1) automatically print …
Formal analysis of an electronic voting system: An experience report
K Weldemariam, RA Kemmerer, A Villafiorita - Journal of Systems and …, 2011 - Elsevier
We have seen that several currently deployed e-voting systems share critical failures in their
design and implementation that render their technical and procedural controls insufficient to …
design and implementation that render their technical and procedural controls insufficient to …
A formal approach to coercion resistance and its application to E-voting
The outbreak of the COVID-19 pandemic brought renewed attention to electronic voting—
this time as a potential option to contain the spread during elections. One of the long …
this time as a potential option to contain the spread during elections. One of the long …