Proxy voting is a form of voting, where the voters can either vote on an issue directly, or delegate their voting right to a proxy. This proxy might for instance be a trusted expert on the particular issue. In this work, we extend the widely studied end-to-end verifiable Helios Internet voting system towards the proxy voting approach. Therefore, we introduce a new type of credentials, so-called delegation credentials. The main purpose of these credentials is to ensure that the proxy has been authorised by an eligible voter to cast a delegated vote. If voters, after delegating, change their mind and want to vote directly, cancelling a delegation is possible throughout the entire voting phase. We show that the proposed extension preserves the...
Helios is a well-established online voting protocol which has been used for different real world ele...
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the elect...
Real-world elections often require threshold cryptosystems so that any t out of ` trustees can proce...
Proxy voting is a form of voting, where the voters can either vote on an issue directly, or delegate...
Internet voting has long been a topic both of public discussion and also of scientific research. Whi...
Proxy voting is a form of voting meant to support the voters who want to delegate their voting right...
In general, most elections follow the principle of equality, or as it came to be known, the principl...
[[abstract]]Electronic voting (e-voting) is used to solve the problems of traditional paper-based vo...
Helios is a web-based end-to-end verifiable electronic voting system which has been said to be suita...
Helios is an end-to-end verifiable remote electronic voting system which has been used for elections...
End-to-end verifiable (E2E-V) voting protocols enable voters to check that their ballots have been c...
We present Helios, an end-to-end verifiable internet voting system. We describe the existing protoco...
International audienceMost electronic voting schemes aim at providing verifiability: voters should t...
Abstract. Most electronic voting schemes aim at providing verifiability: voters should trust the res...
Helios is an end-to-end verifiable remote electronic voting system which has been used for elections...
Helios is a well-established online voting protocol which has been used for different real world ele...
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the elect...
Real-world elections often require threshold cryptosystems so that any t out of ` trustees can proce...
Proxy voting is a form of voting, where the voters can either vote on an issue directly, or delegate...
Internet voting has long been a topic both of public discussion and also of scientific research. Whi...
Proxy voting is a form of voting meant to support the voters who want to delegate their voting right...
In general, most elections follow the principle of equality, or as it came to be known, the principl...
[[abstract]]Electronic voting (e-voting) is used to solve the problems of traditional paper-based vo...
Helios is a web-based end-to-end verifiable electronic voting system which has been said to be suita...
Helios is an end-to-end verifiable remote electronic voting system which has been used for elections...
End-to-end verifiable (E2E-V) voting protocols enable voters to check that their ballots have been c...
We present Helios, an end-to-end verifiable internet voting system. We describe the existing protoco...
International audienceMost electronic voting schemes aim at providing verifiability: voters should t...
Abstract. Most electronic voting schemes aim at providing verifiability: voters should trust the res...
Helios is an end-to-end verifiable remote electronic voting system which has been used for elections...
Helios is a well-established online voting protocol which has been used for different real world ele...
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the elect...
Real-world elections often require threshold cryptosystems so that any t out of ` trustees can proce...