Privacy and verifiability in voting systems: Methods, developments and trends

H Jonker, S Mauw, J Pang - Computer Science Review, 2013 - Elsevier
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …

Accountability: definition and relationship to verifiability

R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …

Sok: Verifiability notions for e-voting protocols

V Cortier, D Galindo, R Küsters, J Müller… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
There have been intensive research efforts in the last two decades or so to design and
deploy electronic voting (e-voting) protocols/systems which allow voters and/or external …

Election verifiability in electronic voting protocols

S Kremer, M Ryan, B Smyth - … : 15th European Symposium on Research in …, 2010 - Springer
We present a formal, symbolic definition of election verifiability for electronic voting protocols
in the context of the applied pi calculus. Our definition is given in terms of boolean tests …

End-to-end verifiable elections in the standard model

A Kiayias, T Zacharias, B Zhang - … on the Theory and Applications of …, 2015 - Springer
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-
to-end verifiable in the standard model, ie, without any additional “setup” assumption or …

BeleniosRF: A non-interactive receipt-free electronic voting scheme

P Chaidos, V Cortier, G Fuchsbauer… - Proceedings of the 2016 …, 2016 - dl.acm.org
We propose a new voting scheme, BeleniosRF, that offers both receipt-freeness and end-to-
end verifiability. It is receipt-free in a strong sense, meaning that even dishonest voters …

Sok: Secure e-voting with everlasting privacy

T Haines, J Mueller, R Mosaheb… - Privacy Enhancing …, 2023 - orbilu.uni.lu
Vote privacy is a fundamental right, which needs to be protected not only during an election,
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …

Adapting Helios for provable ballot privacy

D Bernhard, V Cortier, O Pereira, B Smyth… - … –ESORICS 2011: 16th …, 2011 - Springer
Recent results show that the current implementation of Helios, a practical e-voting protocol,
does not ensure independence of the cast votes, and demonstrate the impact of this lack of …

A game-based definition of coercion resistance and its applications

R Küsters, T Truderung, A Vogt - Journal of Computer Security, 2012 - content.iospress.com
Coercion resistance is one of the most important and intricate security requirements for
voting protocols. Several definitions of coercion resistance have been proposed in the …

[PDF][PDF] Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.

SSM Chow, JK Liu, DS Wong - NDSS, 2008 - researchgate.net
For most elections, receipt-freeness is important–voters are unable to prove to others on
how they voted, in order to prevent vote-buying. Many existing receipt-free electronic voting …