Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on copying other voter’s votes. To capture this and similar attacks, we extend the classical threat model and introduce a new security notion for voting protocols: Vote-Independence. We give a formal definition and analyze its relationship to established privacy properties such as Vote-Privacy, Receipt-Freeness and Coercion-Resistance. In particular we show that even Coercion-Resistant protocols do not necessarily ensure Vote-Independence
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audienceRecently an attack on ballot privacy in Helios has been discovered [20], which...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...