[PDF][PDF] An analysis of the security and privacy issues of the Neovote online voting system

E Leblond, D Sidhoum-Rahal, J Walter - koliaza.com
This article provides the first security and privacy analysis of the Neovote voting system,
which was used for three of the five primaries in the French 2022 presidential election. We …

[PDF][PDF] An analysis of the security and privacy issues of the Neovote online voting system

E Blanchard, A Gallais, E Leblond… - … Joint Conference on …, 2022 - library.oapen.org
This article provides the first security and privacy analysis of the Neovote voting system,
which was used for three of the five primaries in the French 2022 presidential election. We …

[PDF][PDF] Analysis of the cryptographic implementation of the swiss post voting protocol

P Locher, R Haenni, RE Koenig - 2019 - blog.fdik.org
The Swiss Post received in 2017 a certificate for offering their online voting system to 50% of
the electorate. This certificate confirms that corresponding requirements of the Ordinance on …

Cronus: Everlasting privacy with audit and cast

T Haines - Nordic Conference on Secure IT Systems, 2019 - Springer
We present a new online voting scheme with everlasting privacy and cast-as-intended
verifiability. We follow the so called “audit-and-cast” paradigm where the voter audits the …

[PDF][PDF] GI Elections with POLYAS: a Road to End-to-End Verifiable Elections

B Beckert, A Brelle, R Grimm, N Huber… - … Joint Conference on …, 2019 - scholar.archive.org
Starting from 2019, the annual elections of the GI (German Society for Computer Scientists)
will be carried out using a new online voting system developed by POLYAS, aiming at …

Kryvos: Publicly tally-hiding verifiable e-voting

N Huber, R Küsters, T Krips, J Liedtke, J Müller… - Proceedings of the …, 2022 - dl.acm.org
Elections are an important corner stone of democratic processes. In addition to publishing
the final result (eg, the overall winner), elections typically publish the full tally consisting of all …

Improving the verifiability of the Estonian internet voting scheme

S Heiberg, T Martens, P Vinkel, J Willemson - … Joint Conference on …, 2016 - Springer
We describe an update of the Estonian Internet Voting scheme targeted towards adding
verification capabilities to the central system. We propose measures to ensure the …

Threat analysis of a practical voting scheme with receipts

S Foulle, S Schneider, J Traoré, Z Xia - E-Voting and Identity: First …, 2007 - Springer
Kutylowski et al. have introduced a voter-verifiable electronic voting scheme “a practical
voting scheme with receipts”, which provides each voter with a receipt. The voter can use …

The New South Wales iVote system: Security failures and verification flaws in a live online election

JA Halderman, V Teague - E-Voting and Identity: 5th International …, 2015 - Springer
In the world's largest-ever deployment of online voting, the iVote Internet voting system was
trusted for the return of 280,000 ballots in the 2015 state election in New South Wales …

On privacy and anonymity in electronic and non electronic voting: the ballot-as-signature attack.

R Di Cosmo - 2007 - hal.science
A wealth of protocols for electronic voting have been proposed in the literature over the past
years. What makes these protocols difficult to conceive and verify is one fundamental …