The version of record is available online at:10.1007/978-3-030-92548-2_25We consider the problem of achieving, at the same time, cast-as-intended verifiability and coercion resistance, in remote electronic voting systems where there are no secure channels through which voters can receive secret information/credentials before the voting phase. We discuss why some simple solutions fail to achieve the two desired notions and we propose (a bit) more involved solutions that are satisfactory. Part of the discussion is closely related to the gap “full versus honest-verifier” when defining the zero-knowledge property of cryptographic zero-knowledge systems.Peer ReviewedPostprint (author's final draft
International audienceElectronic voting systems aim at two conflicting properties, namely privacy an...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
The version of record is available online at:10.1007/978-3-030-92548-2_25We consider the problem of ...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...
The balance between coercion-resistance, election verifiability and usability remains unresolved in ...
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiabilit...
In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jak...
International audienceThe coercion issue in remote electronic voting has always been of particular i...
Abstract: In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures a...
Voting is an important tool for modern societies. It is fundamental for the democracy. This mechanis...
Recently, remote voting systems have gained popularity and have been used for government elections ...
In this paper we formally study important properties of electronic voting protocols. In particular w...
Coercion-resistance and end-to-end verifiability are properties that real electronic voting systems ...
International audienceElectronic voting systems aim at two conflicting properties, namely privacy an...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
The version of record is available online at:10.1007/978-3-030-92548-2_25We consider the problem of ...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
During the registration phase of remote electronic voting schemes, the voter obtains a credential th...
The balance between coercion-resistance, election verifiability and usability remains unresolved in ...
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiabilit...
In this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jak...
International audienceThe coercion issue in remote electronic voting has always been of particular i...
Abstract: In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures a...
Voting is an important tool for modern societies. It is fundamental for the democracy. This mechanis...
Recently, remote voting systems have gained popularity and have been used for government elections ...
In this paper we formally study important properties of electronic voting protocols. In particular w...
Coercion-resistance and end-to-end verifiability are properties that real electronic voting systems ...
International audienceElectronic voting systems aim at two conflicting properties, namely privacy an...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...