International audienceElectronic voting promises the possibility of convenient and efficient systems for recording and tallying votes in an election. To be widely adopted, ensuring the security of the cryptographic protocols used in e-voting is of paramount importance. However, the security analysis of this type of protocols raises a number of challenges, and they are often out of reach of existing verification tools.In this paper, we study vote privacy, a central security property that should be satisfied by any e-voting system. More precisely, we propose the first formalisation of the state-of-the-art BPRIV notion in the symbolic setting. To ease the formal security analysis of this notion, we propose a reduction result allowing one to bo...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing...
International audienceElectronic voting promises the possibility of convenient and efficient systems...
Electronic voting promises the possibility of convenient and efficient systems for recording and tal...
International audienceProtocols for secure electronic voting are of increasing societal importance. ...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
International audienceWe present a machine-checked security analysis of Belenios-a deployed voting p...
Remote electronic voting is used in several countries for legally binding elections. Unlike academic...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
We present a machine-checked security analysis of Belenios - a deployed voting protocol used already...
International audienceWe advance the state-of-the-art in automated symbolic analysis of ballot secre...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing...
International audienceElectronic voting promises the possibility of convenient and efficient systems...
Electronic voting promises the possibility of convenient and efficient systems for recording and tal...
International audienceProtocols for secure electronic voting are of increasing societal importance. ...
International audiencePrivacy is one of the main issues in electronic voting. We propose a family of...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
International audienceWe present a machine-checked security analysis of Belenios-a deployed voting p...
Remote electronic voting is used in several countries for legally binding elections. Unlike academic...
Privacy is one of the main issues in electronic voting. We propose a modular family of symbolic pri...
We present a machine-checked security analysis of Belenios - a deployed voting protocol used already...
International audienceWe advance the state-of-the-art in automated symbolic analysis of ballot secre...
Recently an attack on ballot privacy in Helios has been discovered, which is essentially based on co...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing...