Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one candidate then all vote privacy evaporates. The mere possibility of candidates getting no or few votes could have implications for security in practice: if a coercer demands that a voter cast a vote for such an unpopular candidate, then the voter may feel obliged to obey, even if she is confident that the voting system satisfies the standard coercion resistance definitions. With complex ballots, there may also be a danger of “Italian” style (aka “signature”) attacks: the coercer demands the vo...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Coercion-resistance is a security property of electronic voting, often considered as a must-have fo...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
peer reviewedWe consider elections that publish anonymised voted ballots or anonymised cast-vote rec...
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in order ...
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes...
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submi...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Abstract. Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical...
Cryptology ePrint Archive: Report 2021/491https://eprint.iacr.org/2021/491International audienceIn m...
Abstract. This paper addresses the board flooding problem of Juels et al.’s coercion-resistant elect...
Abstract: In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures a...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Coercion-resistance is a security property of electronic voting, often considered as a must-have fo...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
peer reviewedWe consider elections that publish anonymised voted ballots or anonymised cast-vote rec...
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in order ...
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes...
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submi...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Abstract. Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical...
Cryptology ePrint Archive: Report 2021/491https://eprint.iacr.org/2021/491International audienceIn m...
Abstract. This paper addresses the board flooding problem of Juels et al.’s coercion-resistant elect...
Abstract: In traditional voting schemes with paper, pens, and ballot-boxes, appropriate procedures a...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
peer reviewedSecurity properties are often focused on the technological side of the system. One impl...
Coercion-resistance is a security property of electronic voting, often considered as a must-have fo...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...