With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting the resources that can be used by attackers, such as the number of voters and the number of votes. In this paper, we argue that powering voting systems with trust and limiting attack resources are not enough. We present a novel attack named as Reputation Trap (RepTrap). Our case study and experiments show that this new attack needs much less resources to manipulate the voting systems and has a much higher success rate compar...
International audienceFormal analysis of security is often focused on the technological side of the ...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
peer reviewedReplay attacks are among the most well-known attacks against vote privacy. Many e-votin...
With the popularity of voting systems in cyberspace, there is growing evidence that current voting s...
Abstract. An increasing number of elections have been performed using Online Voting. Due to these ex...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...
Abstract. One of the major problems that prevents the spread of elec-tions with the possibility of r...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
The last decade, electronic voting has evolved from being a mean of counting votes to also offer the...
STAR-Vote is an end-to-end cryptographic voting system that produces both plaintext paper ballots an...
Verifiability is a central property of modern e-voting systems. Intuitively, verifiability means tha...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Abstract. Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical...
International audienceFormal analysis of security is often focused on the technological side of the ...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
peer reviewedReplay attacks are among the most well-known attacks against vote privacy. Many e-votin...
With the popularity of voting systems in cyberspace, there is growing evidence that current voting s...
Abstract. An increasing number of elections have been performed using Online Voting. Due to these ex...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...
Abstract. One of the major problems that prevents the spread of elec-tions with the possibility of r...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
The last decade, electronic voting has evolved from being a mean of counting votes to also offer the...
STAR-Vote is an end-to-end cryptographic voting system that produces both plaintext paper ballots an...
Verifiability is a central property of modern e-voting systems. Intuitively, verifiability means tha...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Abstract. Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical...
International audienceFormal analysis of security is often focused on the technological side of the ...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
peer reviewedReplay attacks are among the most well-known attacks against vote privacy. Many e-votin...