An overview of end-to-end verifiable voting systems

ST Ali, J Murray - Real-World Electronic Voting, 2016 - taylorfrancis.com
CONTENTS 8.1 Introduction....................................................... 174 8.2 Security Properties of
Voting Systems.............................. 1768.2. 1 Vote Privacy.............................................. 176 8.2. 2 …

Privacy and verifiability in voting systems: Methods, developments and trends

H Jonker, S Mauw, J Pang - Computer Science Review, 2013 - Elsevier
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …

How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios

D Bernhard, O Pereira, B Warinschi - … on the Theory and Application of …, 2012 - Springer
Abstract The Fiat-Shamir transformation is the most efficient construction of non-interactive
zero-knowledge proofs. This paper is concerned with two variants of the transformation that …

Large-scale election based on blockchain

B Wang, J Sun, Y He, D Pang, N Lu - Procedia Computer Science, 2018 - Elsevier
Based on the blockchain, homomorphic ElGamal encryption and ring signature, an
electronic voting scheme based on blockchain is proposed for large-scale voting, which has …

Proverif with lemmas, induction, fast subsumption, and much more

B Blanchet, V Cheval, V Cortier - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
This paper presents a major overhaul of one the most widely used symbolic security protocol
verifiers, ProVerif. We provide two main contributions. First, we extend ProVerif with lemmas …

SoK: A comprehensive analysis of game-based ballot privacy definitions

D Bernhard, V Cortier, D Galindo… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We critically survey game-based security definitions for the privacy of voting schemes. In
addition to known limitations, we unveil several previously unnoticed shortcomings …

Selene: Voting with transparent verifiability and coercion-mitigation

PYA Ryan, PB Rønne, V Iovino - … and Data Security: FC 2016 International …, 2016 - Springer
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in
order to confirm that their vote is accurately included in the tally. While this may be …

Election verifiability for helios under weaker trust assumptions

V Cortier, D Galindo, S Glondu… - … Security-ESORICS 2014 …, 2014 - Springer
Most electronic voting schemes aim at providing verifiability: voters should trust the result
without having to rely on some authorities. Actually, even a prominent voting system like …

DEEPSEC: deciding equivalence properties in security protocols theory and practice

V Cheval, S Kremer… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …

[BOG][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016 - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …