Kryvos: Publicly tally-hiding verifiable e-voting

N Huber, R Küsters, T Krips, J Liedtke, J Müller… - Proceedings of the …, 2022 - dl.acm.org
Elections are an important corner stone of democratic processes. In addition to publishing
the final result (eg, the overall winner), elections typically publish the full tally consisting of all …

Accountability in a permissioned blockchain: Formal analysis of hyperledger fabric

M Graf, R Küsters, D Rausch - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
While accountability is a well-known concept in distributed systems and cryptography, in the
literature on blockchains (and, more generally, distributed ledgers) the formal treatment of …

Sok: Secure e-voting with everlasting privacy

T Haines, J Mueller, R Mosaheb… - Privacy Enhancing …, 2023 - orbilu.uni.lu
Vote privacy is a fundamental right, which needs to be protected not only during an election,
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …

Ordinos: A verifiable tally-hiding e-voting system

R Küsters, J Liedtke, J Müller… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Modern electronic voting systems (e-voting systems) are designed to provide not only vote
privacy but also (end-to-end) verifiability. Several verifiable e-voting systems have been …

SecureBallot: A secure open source e-Voting system

V Agate, A De Paola, P Ferraro, GL Re… - Journal of Network and …, 2021 - Elsevier
Voting is one of the most important acts through which a community can make a collective
decision. In recent years, many works have focused on improving traditional voting …

Thwarting last-minute voter coercion

R Giustolisi, MS Garjan… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Counter-strategies are key components of coercion-resistant voting schemes, allowing
voters to submit votes that represent their own intentions in an environment controlled by a …

Investigating usability and user experience of individually verifiable internet voting schemes

K Marky, ML Zollinger, P Roenne, PYA Ryan… - ACM Transactions on …, 2021 - dl.acm.org
Internet voting can afford more inclusive and inexpensive elections. The flip side is that the
integrity of the election can be compromised by adversarial attacks and malfunctioning …

Is the JCJ voting system really coercion-resistant?

V Cortier, P Gaudry, Q Yang - 2024 IEEE 37th Computer …, 2024 - ieeexplore.ieee.org
Coercion-resistance is a security property of electronic voting, often considered as a must-
have for high-stake elections. The JCJ voting scheme, proposed in 2005 by Juels, Catalano …

Distributed remote e-voting system based on Shamir's secret sharing scheme

M Tejedor-Romero, D Orden, I Marsa-Maestre… - Electronics, 2021 - mdpi.com
A number of e-voting systems have been proposed in the last decades, attracting the interest
of the research community. The challenge is far from being fully addressed, especially for …

Tiresias: Large scale, maliciously secure threshold paillier

O Friedman, A Marmor, D Mutzari, YC Scaly… - Cryptology ePrint …, 2023 - eprint.iacr.org
In the threshold version of Paillier's encryption scheme, a set of parties collectively holds the
secret decryption key through a secret sharing scheme. Whenever a ciphertext is to be …