Adapting Helios for provable ballot privacy

D Bernhard, V Cortier, O Pereira, B Smyth… - … –ESORICS 2011: 16th …, 2011 - Springer
Recent results show that the current implementation of Helios, a practical e-voting protocol,
does not ensure independence of the cast votes, and demonstrate the impact of this lack of …

Election verifiability or ballot privacy: Do we need to choose?

E Cuvelier, O Pereira, T Peters - … Security, Egham, UK, September 9-13 …, 2013 - Springer
We propose a new encryption primitive, commitment consistent encryption (CCE), and
instances of this primitive that enable building the first universally verifiable voting schemes …

Some remarks on a receipt-free and universally verifiable mix-type voting scheme

M Michels, P Horster - International Conference on the Theory and …, 1996 - Springer
Abstract At Eurocrypt'95 Sako and Kilian presented the first Mix-type voting scheme which is
receipt-free and universally verifiable. In this contribution we analyze this scheme and show …

Three voting protocols: ThreeBallot, VAV, and Twin

RL Rivest, WD Smith - USENIX/ACCURATE Electronic Voting …, 2007 - usenix.org
We present three new paper-based voting methods with interesting security properties. Our
goal is to achieve the same security properties as recently proposed cryptographic voting …

[PDF][PDF] Receipt-free secret-ballot elections

J Benaloh, D Tuinstra - Proceedings of the twenty-sixth annual ACM …, 1994 - dl.acm.org
Prior verifiable secret-ballot election protocols all suffer from a common defect whkhrenderst
hemunsuitablef orpracticalu se: they allow voters to (if they wish) carry away from the …

The threeballot voting system

RL Rivest - 2006 - dspace.mit.edu
We present a new paper-based voting method with interesting security properties. The
attempt here is to see if one can achieve the same security properties of recently proposed …

[PDF][PDF] Cryptographic Voting Protocols: A Systems Perspective.

C Karlof, N Sastry, DA Wagner - USENIX Security Symposium, 2005 - usenix.org
Cryptographic voting protocols offer the promise of verifiable voting without needing to trust
the integrity of any software in the system. However, these cryptographic protocols are only …

The vector-ballot e-voting approach

A Kiayias, M Yung - International Conference on Financial Cryptography, 2004 - Springer
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic
design paradigms (or approaches):(a) Mix-Networks based,(b) Homomorphic Encryption …

Prêt à voter with re-encryption mixes

PYA Ryan, SA Schneider - … 2006: 11th European Symposium on Research …, 2006 - Springer
We present a number of enhancements to the voter verifiable election scheme Prêt à Voter
[CRS05]. Firstly, we propose a mechanism for the distributed construction by a set of …

Scratch & vote: self-contained paper-based cryptographic voting

B Adida, RL Rivest - Proceedings of the 5th ACM workshop on Privacy …, 2006 - dl.acm.org
We present Scratch & Vote;(S&V), a cryptographic voting system designed to minimize cost
and complexity:(1) ballots are paper-based and can be printed using today's technology,(2) …