We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll results. The protocols use simple physical objects (envelopes or scratch-off cards) and can be performed without the aid of computers. One of the main innovations of this work is the use of techniques from theoretical cryptography to rigorously prove the security of a realistic, physical protocol. We show that, given a few properties of physical envelopes, the protocols are unconditionally secure in the universal composability framework
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Recently, Xia et al. proposed a variant of Prêt a ̀ Voter which enjoys several attractive...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
Most security protocols appearing in the literature make use of cryptographic primitives that assume...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
Abstract. Most security protocols appearing in the literature make use of cryptographic primitives t...
In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and...
AbstractIn this article, we attempt to formally study two very intuitive physical models: sealed env...
There has been several recent attempts to enhance postal voting systems with the technologies of en...
The Pret a Voter election scheme provides high assurance of accuracy and secrecy, due to the high de...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...
peer reviewedThis proposal aims to combine the best properties of paper-based and end-to-end verifia...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
We introduce a new framework for polling responses from a large population. Our framework allows gat...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Recently, Xia et al. proposed a variant of Prêt a ̀ Voter which enjoys several attractive...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
Most security protocols appearing in the literature make use of cryptographic primitives that assume...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
Abstract. Most security protocols appearing in the literature make use of cryptographic primitives t...
In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and...
AbstractIn this article, we attempt to formally study two very intuitive physical models: sealed env...
There has been several recent attempts to enhance postal voting systems with the technologies of en...
The Pret a Voter election scheme provides high assurance of accuracy and secrecy, due to the high de...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
We present a voting protocol that protects voters’ privacy and achieves universal verifiability, rec...
peer reviewedThis proposal aims to combine the best properties of paper-based and end-to-end verifia...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
We introduce a new framework for polling responses from a large population. Our framework allows gat...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Recently, Xia et al. proposed a variant of Prêt a ̀ Voter which enjoys several attractive...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...