Most electronic voting schemes aim at providing verifiability: voters should trust the result without having to rely on some authorities. Actually, even a prominent voting system like Helios cannot fully achieve verifiability since a dishonest bulletin board may add ballots. This problem is called ballot stuffing. In this paper we give a definition of verifiability in the computational model to account for a malicious bulletin board that may add ballots. Next, we provide a generic construction that transforms a voting scheme that is verifiable against an honest bulletin board and an honest registration authority (weak verifiability) into a verifiable voting scheme under the weaker trust assumption that the registration authority and the bul...
We propose a definition of ballot secrecy as an indistinguishability game in the computational model...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
International audienceWe provide the first machine-checked proof of privacy-related properties (incl...
Most electronic voting schemes aim at providing verifiability: voters should trust the result withou...
Abstract. Most electronic voting schemes aim at providing verifiability: voters should trust the res...
Most voting schemes aim at providing verifiability: voters should be able to check that their ballot...
Helios 2.0 is a web-based end-to-end verifiable electronic voting system, suitable for use in low-co...
Helios is a well-established online voting protocol which has been used for different real world ele...
Internet voting has long been a topic both of public discussion and also of scientific research. Whi...
Helios is a web-based end-to-end verifiable electronic voting system which has been said to be suita...
International audienceHelios 2.0 is an open-source web-based end-to-end verifiable electronic voting...
The Helios voting scheme is well studied including formal proofs for verifiability and ballot privac...
International audienceWe propose a framework for the analysis of electronic voting schemes in the pr...
International audienceWe present a machine-checked security analysis of Belenios-a deployed voting p...
International audienceRecent results show that the current implementation of Helios, a practical e-v...
We propose a definition of ballot secrecy as an indistinguishability game in the computational model...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
International audienceWe provide the first machine-checked proof of privacy-related properties (incl...
Most electronic voting schemes aim at providing verifiability: voters should trust the result withou...
Abstract. Most electronic voting schemes aim at providing verifiability: voters should trust the res...
Most voting schemes aim at providing verifiability: voters should be able to check that their ballot...
Helios 2.0 is a web-based end-to-end verifiable electronic voting system, suitable for use in low-co...
Helios is a well-established online voting protocol which has been used for different real world ele...
Internet voting has long been a topic both of public discussion and also of scientific research. Whi...
Helios is a web-based end-to-end verifiable electronic voting system which has been said to be suita...
International audienceHelios 2.0 is an open-source web-based end-to-end verifiable electronic voting...
The Helios voting scheme is well studied including formal proofs for verifiability and ballot privac...
International audienceWe propose a framework for the analysis of electronic voting schemes in the pr...
International audienceWe present a machine-checked security analysis of Belenios-a deployed voting p...
International audienceRecent results show that the current implementation of Helios, a practical e-v...
We propose a definition of ballot secrecy as an indistinguishability game in the computational model...
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ...
International audienceWe provide the first machine-checked proof of privacy-related properties (incl...