Belenios with cast as intended

V Cortier, A Debant, P Gaudry, S Glondu - International Conference on …, 2023 - Springer
We propose the BeleniosCaI protocol, a variant of Belenios which brings the cast-as-
inended property, in addition to other existing security properties. Our approach is based on …

[PDF][PDF] Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol

T Hilt, K Sein, T Mällo, J Villemson… - … Joint Conference on …, 2023 - research.cyber.ee
The internet voting protocol deployed at Estonian political elections was enhanced by cast-
as-intended vote verifyability mechanism in 2013 to reveal manipulations of the vote casting …

[PDF][PDF] Investigating Transparency Dimensions for Internet Voting

S Agbesi, J Budurushi, A Dalela… - … Joint Conference on …, 2023 - library.oapen.org
While Internet voting is argued to have the potential to improve election processes, concerns
about security risks remain one of its main adoption barriers. These concerns are …

Efficient and Usable Coercion-Resistant E-Voting on the Blockchain

ND Sarier - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract In [1], Sarier presents a practical biometric-based non-transferable credential
scheme that maintains the efficiency of the underlying Brands credential. In this paper, we …

Comparison of methods for analyzing the correlation of user experience and information security

M Sauer, S Alpers, C Becker - Proceedings of the 2023 5th International …, 2023 - dl.acm.org
User experience (UX) is a quality requirement of software, but it can also negatively or
positively influence the information security. It is not uncommon for users to misuse or even …

[PDF][PDF] Coercion-resistance in electronic voting: design and analysis

Q Yang - 2023 - members.loria.fr
Voting is the basis of all democracies: it is the keystone that legitimates the actions of a
government, and is described by Lyndon B. Johnson, the 58th president of the USA, as the …

Check for Belenios with Cast as Intended Véronique Cortier (), Alexandre Debant, Pierrick Gaudry, and Stéphane Glondu Université de Lorraine, CNRS, INRIA, LORIA …

V Cortier - Financial Cryptography and Data Security. FC 2023 …, 2023 - books.google.com
We propose the BeleniosCal protocol, a variant of Belenios which brings the cast-as-
inended property, in addition to other existing security properties. Our approach is based on …

Résistance à la coercition en vote électronique: conception et analyse

Q Yang - 2023 - theses.hal.science
Voting is a central tool for the proper functioning of any democracy. Despite its use in high-
stakes elections, electronic voting does not yet provide the same level of security as paper …

Deep Learning & Computer Vision Integrated Smart Voting System

S Dube, MVS Sandeep… - … and Electrical Circuits …, 2023 - ieeexplore.ieee.org
In this paper, an online voting method for elections in India is initially suggested. The
suggested model has higher security as the voter's raised secure password must be …

PriVote: An Anonymized and Secured Ethereum-based Internet Voting System

MR Yoshizaki - 2023 - dspace.cas.upm.edu.ph
The proposed system, PriVote, is an innovative and secure e-voting solution for Philippines
Barangay SK elections. This web application is built on the Ethereum blockchain, utilizing …