Abstract—We critically survey game-based security definitions for the privacy of voting schemes. In addition to known lim-itations, we unveil several previously unnoticed shortcomings. Surprisingly, the conclusion of our study is that none of the existing definitions is satisfactory: they either provide only weak guarantees, or can be applied only to a limited class of schemes, or both. Based on our findings, we propose a new game-based definition of privacy which we call BPRIV. We also identify a new property which we call strong consistency, needed to express that tallying does not leak sensitive information. We validate our security notions by showing that BPRIV, strong consistency (and an additional simple property called strong correct...
Abstract. We study ballot independence for election schemes: – We formally define ballot independenc...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. Th...
We critically survey game-based security definitions for the privacy of voting schemes. In addition ...
Abstract. We critically survey game-based security definitions for the privacy of voting schemes. In...
International audienceWe propose a new measure for privacy of votes. Our measure relies on computati...
We study ballot secrecy and ballot independence for election schemes. First, we propose a definition...
We exhibit the precise security guarantees that a public key encryption scheme needs to satisfy to g...
We propose a new measure for privacy of votes. Our measure relies on computational conditional entro...
We propose a definition of ballot secrecy as an indistinguishability game in the computational model...
One of the most challenging aspects in computer-supported voting is to combine the apparently confli...
International audiencePrivacy is a notoriously difficult property to achieve in complicated systems ...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems hav...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. We study ballot independence for election schemes: – We formally define ballot independenc...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. Th...
We critically survey game-based security definitions for the privacy of voting schemes. In addition ...
Abstract. We critically survey game-based security definitions for the privacy of voting schemes. In...
International audienceWe propose a new measure for privacy of votes. Our measure relies on computati...
We study ballot secrecy and ballot independence for election schemes. First, we propose a definition...
We exhibit the precise security guarantees that a public key encryption scheme needs to satisfy to g...
We propose a new measure for privacy of votes. Our measure relies on computational conditional entro...
We propose a definition of ballot secrecy as an indistinguishability game in the computational model...
One of the most challenging aspects in computer-supported voting is to combine the apparently confli...
International audiencePrivacy is a notoriously difficult property to achieve in complicated systems ...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems hav...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract. We study ballot independence for election schemes: – We formally define ballot independenc...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. Th...