In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jakobsson (JCJ) and in particular the attempts to make it usable and practical. In JCJ the user needs to handle cryptographic credentials and be able to fake these in case of coercion. In a series of three papers Neumann et al. analysed the usability of JCJ, and constructed and implemented a practical credential handling system using a smart card which unlock the true credential via a PIN code, respectively fake the credential via faking the PIN. We present several attacks and problems with the security of this protocol, especially an attack on coercion-resistance due to information leakage from the removal of duplicate ballots. Another problem...
Voting is an important tool for modern societies. It is fundamental for the democracy. This mechanis...
Abstract. We propose a simple cast-as-intended remote e-voting protocol where the security is based ...
The version of record is available online at:10.1007/978-3-030-92548-2_25We consider the problem of ...
International audienceThe coercion issue in remote electronic voting has always been of particular i...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...
Internet voting continues to raise interest both among research and society. Throughout the last dec...
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiabilit...
Abstract: We introduce an electronic election scheme, that is coercion-resistant, a notion introduce...
International audienceCoercion-resistance is a security property of electronic voting, often conside...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Under the presupposition of security, privacy and transparency, electronic voting is regarded as the...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Voting is an important tool for modern societies. It is fundamental for the democracy. This mechanis...
Abstract. We propose a simple cast-as-intended remote e-voting protocol where the security is based ...
The version of record is available online at:10.1007/978-3-030-92548-2_25We consider the problem of ...
International audienceThe coercion issue in remote electronic voting has always been of particular i...
Part 4: Network Security and Security ProtocolsInternational audienceThis paper addresses the board ...
Internet voting continues to raise interest both among research and society. Throughout the last dec...
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiabilit...
Abstract: We introduce an electronic election scheme, that is coercion-resistant, a notion introduce...
International audienceCoercion-resistance is a security property of electronic voting, often conside...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audi...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Under the presupposition of security, privacy and transparency, electronic voting is regarded as the...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Voting is an important tool for modern societies. It is fundamental for the democracy. This mechanis...
Abstract. We propose a simple cast-as-intended remote e-voting protocol where the security is based ...
The version of record is available online at:10.1007/978-3-030-92548-2_25We consider the problem of ...