Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes elections, electronic voting does not yet provide the same level of security as paper voting. In particular, existing threats such as coercion and vote buying may increase and impact the results.In this thesis, we study academic solutions to address these phenomena, namely the notions of coercion-resistance and receipt-freeness.On these topics, we identify some limitations on the existing definitions and propose new definitions to model more attack scenarios.Besides these theoretical contributions, we propose practical strategies to eliminate certain risks, such as Italian attacks and vote buying. To this end, we develop a toolbox based on m...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes...
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as we...
In this paper we formally study important properties of electronic voting protocols. In particular w...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...
Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strat...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
Coercion-resistance and end-to-end verifiability are properties that real electronic voting systems ...
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditi...
Abstract. By now, many voting protocols have been proposed that, among others, are designed to achie...
Most of today’s voting protocols are vulnerable to coercion and votebuying because they allow the vo...
We propose a new voting scheme, BeleniosRF, that offers both receipt-freeness and end-to-end verifi...
peer reviewedElectronic voting (e-voting) is regularly used in many countries and organizations for ...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-stakes...
In this paper a new electronic voting scheme is described which guarantees coercion-resistance as we...
In this paper we formally study important properties of electronic voting protocols. In particular w...
peer reviewedPret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses in...
Voting is a mechanism of utmost importance to social processes. In this paper, we focus on the strat...
The strongest threat model for voting systems considers coercion resistance: protection against coer...
Coercion-resistance and end-to-end verifiability are properties that real electronic voting systems ...
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditi...
Abstract. By now, many voting protocols have been proposed that, among others, are designed to achie...
Most of today’s voting protocols are vulnerable to coercion and votebuying because they allow the vo...
We propose a new voting scheme, BeleniosRF, that offers both receipt-freeness and end-to-end verifi...
peer reviewedElectronic voting (e-voting) is regularly used in many countries and organizations for ...
In this work, we study two essential but apparently contradictory properties of electronic voting sy...
Coercion resistance is one of the most important features of a secure voting procedure. Recently sev...
Abstract. End-to-end verifiable voting schemes typically involves vot-ers handling an encrypted ball...