Automated verification of equivalence properties of cryptographic protocols

R Chadha, V Cheval, Ş Ciobâcă, S Kremer - ACM Transactions on …, 2016 - dl.acm.org
Indistinguishability properties are essential in formal verification of cryptographic protocols.
They are needed to model anonymity properties, strong versions of confidentiality, and …

Sok: Secure e-voting with everlasting privacy

T Haines, J Mueller, R Mosaheb… - Proceedings on Privacy …, 2023 - orbilu.uni.lu
[en] Vote privacy is a fundamental right, which needs to be protected not only during an
election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic …

Design of distributed voting systems

C Meter - arXiv preprint arXiv:1702.02566, 2017 - arxiv.org
Countries like Estonia, Norway or Australia developed electronic voting systems, which
could be used to realize parliamentary elections with the help of personal computers and the …

Election verifiability or ballot privacy: Do we need to choose?

E Cuvelier, O Pereira, T Peters - … Security, Egham, UK, September 9-13 …, 2013 - Springer
We propose a new encryption primitive, commitment consistent encryption (CCE), and
instances of this primitive that enable building the first universally verifiable voting schemes …

Towards everlasting privacy and efficient coercion resistance in remote electronic voting

P Grontas, A Pagourtzis, A Zacharakis… - … Cryptography and Data …, 2019 - Springer
In this work, we propose a first version of an e-voting scheme that achieves end-to-end
verifiability, everlasting privacy and efficient coercion resistance in the JCJ setting …

[HTML][HTML] A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols

S Delaune, L Hirschi - Journal of Logical and Algebraic Methods in …, 2017 - Elsevier
Cryptographic protocols aim at securing communications over insecure networks such as
the Internet, where dishonest users may listen to communications and interfere with them. A …

Distributed elgamal á la pedersen: application to helios

V Cortier, D Galindo, S Glondu… - Proceedings of the 12th …, 2013 - dl.acm.org
Real-world elections often require threshold cryptosystems so that any t out of l trustees can
proceed to tallying. This is needed to protect the confidentiality of the voters' votes against …

Coercion-resistant internet voting with everlasting privacy

P Locher, R Haenni, RE Koenig - … 26, 2016, Revised Selected Papers 20, 2016 - Springer
The cryptographic voting protocol presented in this paper offers public verifiability,
everlasting privacy, and coercion-resistance simultaneously. Voters are authenticated …

Type-based verification of electronic voting protocols

V Cortier, F Eigner, S Kremer, M Maffei… - … 2015, Held as Part of the …, 2015 - Springer
E-voting protocols aim at achieving a wide range of sophisticated security properties and,
consequently, commonly employ advanced cryptographic primitives. This makes their …

Using selene to verify your vote in JCJ

V Iovino, A Rial, PB Rønne, PYA Ryan - … , and TA, Sliema, Malta, April 7 …, 2017 - Springer
We show how to combine the individual verification mechanism of Selene with the coercion-
resistant e-voting scheme from Juels, Catalano and Jakobsson (JCJ). This results in an e …