Security analysis of the Estonian internet voting system

D Springall, T Finkenauer, Z Durumeric… - Proceedings of the …, 2014 - dl.acm.org
Estonia was the first country in the world to use Internet voting nationally, and today more
than 30% of its ballots are cast online. In this paper, we analyze the security of the Estonian I …

{ElectionGuard}: a Cryptographic Toolkit to Enable Verifiable Elections

J Benaloh, M Naehrig, O Pereira… - 33rd USENIX Security …, 2024 - usenix.org
ElectionGuard is a flexible set of open-source tools that—when used with traditional election
systems—can produce end-to-end verifiable elections whose integrity can be verified by …

Ballot-marking devices cannot ensure the will of the voters

AW Appel, RA DeMillo, PB Stark - Election Law Journal: Rules …, 2020 - liebertpub.com
The complexity of US elections usually requires computers to count ballots—but computers
can be hacked, so election integrity requires a voting system in which paper ballots can be …

Internet voting using zcash

P Tarasov, H Tewari - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Voting systems have been around for hundreds of years and despite different views on their
integrity, have always been deemed secure with some fundamental security and anonymity …

On the security properties of e-voting bulletin boards

A Kiayias, A Kuldmaa, H Lipmaa, J Siim… - … Conference on Security …, 2018 - Springer
In state-of-the-art e-voting systems, a bulletin board (BB) is a critical component for
preserving election integrity and availability. We introduce a framework for the formal …

D-DEMOS: A distributed, end-to-end verifiable, internet voting system

N Chondros, B Zhang, T Zacharias… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
E-voting systems have emerged as a powerful technology for improving democracy by
reducing election cost, increasing voter participation, and even allowing voters to directly …

How to verifiably encrypt many bits for an election?

H Devillez, O Pereira, T Peters - European Symposium on Research in …, 2022 - Springer
The verifiable encryption of bits is the main computational step that is needed to prepare
ballots in many practical voting protocols. Its computational load can also be a practical …

User Experience Design for E-Voting: How mental models align with security mechanisms

ML Zollinger, V Distler, PB Roenne, PYA Ryan… - arxiv preprint arxiv …, 2021 - arxiv.org
This paper presents a mobile application for vote-casting and vote-verification based on the
Selene e-voting protocol and explains how it was developed and implemented using the …

Voter verification of ballot marking device ballots is a two-part question: Can they? Mostly, they can. Do they? Mostly, they don't

P Kortum, MD Byrne, J Whitmore - Election Law Journal: Rules …, 2021 - liebertpub.com
The question of whether or not voters actually verify ballots produced by ballot marking
devices (BMDs) is presently the subject of some controversy. Recent studies (eg, Bernhard …

The trust in voting systems (TVS) measure

CZ Acemyan, P Kortum, FL Oswald - International Journal of …, 2022 - igi-global.com
It is essential to democracy that voters trust voting systems enough to participate in elections
and use these systems. Unfortunately, voter trust has been found to be low in many …