In an election where each voter may express $P$ preferences among $M$ possible choices, the Amun protocol allows to secure vote casting against over-the-shoulder adversaries, retaining privacy, fairness, end-to-end verifiability, and correctness. Before the election, each voter receives a ballot containing valid and decoy tokens: only valid tokens contribute in the final tally, but they remain indistinguishable from the decoys. Since the voter is the only one who knows which tokens are valid (without being able to prove it to a coercer), over-the-shoulder attacks are thwarted. We prove the security of the construction under the standard Decisional Diffie Hellman assumption in the random oracle model
We give suggestions for protection against adversaries with access to the voter's equipment in votin...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
peer reviewedElectronic voting (e-voting) is regularly used in many countries and organizations for ...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Secure electronic voting is a relatively trivial exercise if a single authority can be completely tr...
The cornerstone of secure electronic voting protocols lies in the principle of individual verifiabil...
Coercion resistance is one of the most important features of a secure voting procedure. Because of t...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-to-end ver...
Coercion is one of the remaining issues on internet voting. Many developing countries are prone to ...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...
In most verifiable electronic voting schemes, one key step is the tally phase, where the election re...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
We give suggestions for protection against adversaries with access to the voter's equipment in votin...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...
peer reviewedElectronic voting (e-voting) is regularly used in many countries and organizations for ...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Secure electronic voting is a relatively trivial exercise if a single authority can be completely tr...
The cornerstone of secure electronic voting protocols lies in the principle of individual verifiabil...
Coercion resistance is one of the most important features of a secure voting procedure. Because of t...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-to-end ver...
Coercion is one of the remaining issues on internet voting. Many developing countries are prone to ...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...
In most verifiable electronic voting schemes, one key step is the tally phase, where the election re...
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such a...
We give suggestions for protection against adversaries with access to the voter's equipment in votin...
Elections are the foundations of democracy. To uphold democratic principles, researchers have propos...
An E-voting system is end-to-end verifiable if arbitrary external parties can check whether the resu...