An overview of end-to-end verifiable voting systems

ST Ali, J Murray - Real-world electronic voting, 2016 - taylorfrancis.com
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …

Remote electronic voting in uncontrolled environments: A classifying survey

MP Heinl, S Gölz, C Bösch - ACM Computing Surveys, 2022 - dl.acm.org
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …

[KNJIGA][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016 - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …

Fixing the achilles heel of e-voting: the bulletin board

L Hirschi, L Schmid, D Basin - 2021 IEEE 34th Computer …, 2021 - ieeexplore.ieee.org
The results of electronic elections should be verifiable so that any cheating is detected. To
support this, many protocols employ an electronic bulletin board (BB) for publishing data that …

Du-vote: Remote electronic voting with untrusted computers

GS Grewal, MD Ryan, L Chen… - 2015 IEEE 28th …, 2015 - ieeexplore.ieee.org
Du-Vote is a new remote electronic voting protocol that eliminates the often-required
assumption that voters trust general-purpose computers. Trust is distributed in Du-Vote …

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

LH Merino, A Azhir, H Zhang… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Online voting is attractive for convenience and accessibility, but is more susceptible to voter
coercion and vote buying than in-person voting. One mitigation is to give voters fake voting …

On practical aspects of coercion-resistant remote voting systems

K Krips, J Willemson - Electronic Voting: 4th International Joint Conference …, 2019 - Springer
Coercive behaviour is hard to control in the remote electronic voting setting. This is why a
number of protocols have been proposed that aim at mitigating this threat. However, these …

Usability considerations for coercion-resistant election systems

AS Neto, M Leite, R Araújo, MP Mota… - Proceedings of the 17th …, 2018 - dl.acm.org
Coercion is an inherent problem of any Internet election. Because voters can vote from any
connected place and there is no voting booth to protect them while voting, coercers can …

Using selene to verify your vote in JCJ

V Iovino, A Rial, PB Rønne, PYA Ryan - … , and TA, Sliema, Malta, April 7 …, 2017 - Springer
We show how to combine the individual verification mechanism of Selene with the coercion-
resistant e-voting scheme from Juels, Catalano and Jakobsson (JCJ). This results in an e …

Blinded additively homomorphic encryption schemes for self-tallying voting

J Dossogne, F Lafitte - Proceedings of the 6th International Conference …, 2013 - dl.acm.org
In this paper, we propose a self-tallying election protocol based public key homomorphic
encryption. The additive homomorphism allows a set of participants (voters) to publish an …