peer reviewedWe consider elections that publish anonymised voted ballots or anonymised cast-vote records for transparency or verification purposes, investigating the implications for privacy, coercion, and vote selling and exploring how partially masking the ballots can alleviate these issues. Risk Limiting Tallies (RLT), which reveal only a random sample of ballots, were previously proposed to mitigate some coercion threats. Masking some ballots provides coerced voters with plausible deniability, while risk-limiting techniques ensure that the required confidence level in the election result is achieved. Risk-Limiting Verification (RLV) extended this approach to masking a random subset of receipts or trackers. Here we show how these ideas c...
peer reviewedVerifiable voting systems allow voters to check whether their ballot is correctly recor...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We solve a long-standing challenge to the integrity of votes cast without the supervision of a voti...
Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully de...
Cryptology ePrint Archive: Report 2021/491https://eprint.iacr.org/2021/491International audienceIn m...
End-to-end verifiable voting schemes typically involves voters handling an encrypted ballot in order...
Risk-limiting audits (RLAs) guarantee a high probability of correcting incorrect reported outcomes b...
Abstract. To prevent bribery and coercion attacks on voters, current online election schemes rely on...
The cornerstone of secure electronic voting protocols lies in the principle of individual verifiabil...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submi...
In order to guarantee a fair and transparent voting process, electronic voting schemes must be verif...
Computer based voting brings up huge challenges for technology. On the one hand an electronic voting...
After an election, should election officials release an electronic record of each ballot? The releas...
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in order ...
peer reviewedVerifiable voting systems allow voters to check whether their ballot is correctly recor...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We solve a long-standing challenge to the integrity of votes cast without the supervision of a voti...
Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully de...
Cryptology ePrint Archive: Report 2021/491https://eprint.iacr.org/2021/491International audienceIn m...
End-to-end verifiable voting schemes typically involves voters handling an encrypted ballot in order...
Risk-limiting audits (RLAs) guarantee a high probability of correcting incorrect reported outcomes b...
Abstract. To prevent bribery and coercion attacks on voters, current online election schemes rely on...
The cornerstone of secure electronic voting protocols lies in the principle of individual verifiabil...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submi...
In order to guarantee a fair and transparent voting process, electronic voting schemes must be verif...
Computer based voting brings up huge challenges for technology. On the one hand an electronic voting...
After an election, should election officials release an electronic record of each ballot? The releas...
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in order ...
peer reviewedVerifiable voting systems allow voters to check whether their ballot is correctly recor...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We solve a long-standing challenge to the integrity of votes cast without the supervision of a voti...