Abstract. By now, many voting protocols have been proposed that, among others, are designed to achieve coercion-resistance, i.e., resis-tance to vote buying and voter coercion. Scantegrity II is among the most prominent and successful such protocols in that it has been used in several elections. However, almost none of the modern voting proto-cols used in practice, including Scantegrity II, has undergone a rigorous cryptographic analysis. In this paper, we prove that Scantegrity II enjoys an optimal level of coercion-resistance, i.e., the same level of coercion-resistance as an ideal voting protocol (which merely reveals the outcome of the election), ex-cept for so-called forced abstention attacks. This result is obtained under the (necessa...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...
Coercion-resistance is defined and used to analyze/discuss the voting systems Civitas and the Norweg...
Coercion-resistance becomes major property must be fulfilled by Internet-based voting scheme because...
Coercion resistance is one of the most important and intricate security require-ments for voting pro...
Abstract—Coercion-resistance is one of the most important and intricate security requirements for vo...
Abstract—Coercion resistance is an important and one of the most intricate security requirements of ...
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
In this paper we formally study important properties of electronic voting protocols. In particular w...
International audienceCoercion-resistance is a security property of electronic voting, often conside...
Coercion-resistance and end-to-end verifiability are properties that real electronic voting systems ...
Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strat...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...
Coercion-resistance is defined and used to analyze/discuss the voting systems Civitas and the Norweg...
Coercion-resistance becomes major property must be fulfilled by Internet-based voting scheme because...
Coercion resistance is one of the most important and intricate security require-ments for voting pro...
Abstract—Coercion-resistance is one of the most important and intricate security requirements for vo...
Abstract—Coercion resistance is an important and one of the most intricate security requirements of ...
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
In this paper we formally study important properties of electronic voting protocols. In particular w...
International audienceCoercion-resistance is a security property of electronic voting, often conside...
Coercion-resistance and end-to-end verifiability are properties that real electronic voting systems ...
Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strat...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...