International audienceWe propose a framework for the analysis of electronic voting schemes in the presence of malicious bulletin boards. We identify a spectrum of notions where the adversary is allowed to tamper with the bulletin board in ways that reflect practical deployment and usage considerations. To clarify the security guarantees provided by the different notions we establish a relation with simulation-based security with respect to a family of ideal functionalities. The ideal functionalities make clear the set of authorised attacker capabilities which makes it easier to understand and compare the associated levels of security. We then leverage this relation to show that each distinct level of ballot privacy entails some distinct for...
International audienceProtocols for secure electronic voting are of increasing societal importance. ...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Helios 2.0 is a web-based end-to-end verifiable electronic voting system, suitable for use in low-co...
International audienceElectronic voting promises the possibility of convenient and efficient systems...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audienceHelios 2.0 is an open-source web-based end-to-end verifiable electronic voting...
International audiencePrivacy is a notoriously difficult property to achieve in complicated systems ...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
We give suggestions for protection against adversaries with access to the voter's equipment in votin...
International audienceWe present a machine-checked security analysis of Belenios-a deployed voting p...
Abstract—Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by mak...
International audienceProtocols for secure electronic voting are of increasing societal importance. ...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Helios 2.0 is a web-based end-to-end verifiable electronic voting system, suitable for use in low-co...
International audienceElectronic voting promises the possibility of convenient and efficient systems...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audienceHelios 2.0 is an open-source web-based end-to-end verifiable electronic voting...
International audiencePrivacy is a notoriously difficult property to achieve in complicated systems ...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
We give suggestions for protection against adversaries with access to the voter's equipment in votin...
International audienceWe present a machine-checked security analysis of Belenios-a deployed voting p...
Abstract—Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by mak...
International audienceProtocols for secure electronic voting are of increasing societal importance. ...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...