A wealth of protocols for electronic voting have been proposed in the literature over the past years. What makes these protocols diffi-cult to conceive and verify is one fundamental property, anonymity, which is of paramount importance in the real world, in particular when performing actual political elections. Historically, certain techniques have been used in actual elections to nullify anonymity and effectively coerce voters, by exploiting an evident weakness in many voting protocols; these techniques were used in traditional elections well before the notion of electronic vot-ing was even proposed, yet, they still seem to be little known: as a consequence, we find recent proposals of voting protocols that can easily be attacked this way,...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
Electronic voting is rich with paradoxes. How can a voter verify that his own vote has been correctl...
According to international law, anonymity of the voter is a fundamental precondition for democratic ...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
Abstract. We describe a practical e-voting protocol which guarantees e-voting protocol requirements:...
Free and fair elections are the basis for democracy, but conducting elections is not an easy task. D...
One of the most challenging aspects in computer-supported voting is to combine the apparently confli...
International audienceHelios 2.0 is an open-source web-based end-to-end verifiable electronic voting...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Computer based voting brings up huge challenges for technology. On the one hand an electronic voting...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large s...
Privacy and verifiability refer to fundamental principles of democratic elections and therefore belo...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
Electronic voting is rich with paradoxes. How can a voter verify that his own vote has been correctl...
According to international law, anonymity of the voter is a fundamental precondition for democratic ...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
What could be easier than counting a bunch of votes! is a natural thought when one first thinks of ...
Abstract. We describe a practical e-voting protocol which guarantees e-voting protocol requirements:...
Free and fair elections are the basis for democracy, but conducting elections is not an easy task. D...
One of the most challenging aspects in computer-supported voting is to combine the apparently confli...
International audienceHelios 2.0 is an open-source web-based end-to-end verifiable electronic voting...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Computer based voting brings up huge challenges for technology. On the one hand an electronic voting...
This paper presents a novel secret voting scheme which fully conforms to the requirements of large s...
Privacy and verifiability refer to fundamental principles of democratic elections and therefore belo...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
Electronic voting is rich with paradoxes. How can a voter verify that his own vote has been correctl...