Filters








23 Hits in 2.8 sec

Belenios: A Simple Private and Verifiable Electronic Voting System [chapter]

Véronique Cortier, Pierrick Gaudry, Stéphane Glondu
2019 Lecture Notes in Computer Science  
We present the electronic voting protocol Belenios together with its associated voting platform. Belenios guarantees vote privacy and full verifiability, even against a compromised voting server.  ...  While the core of the voting protocol was already described and formally proved secure, we detail here the complete voting system from the setup to the tally and the recovery procedures.  ...  Modern electronic voting systems aim at two main properties: vote privacy (no one should know my vote) and verifiability (it is possible to check that the votes are correctly counted).  ... 
doi:10.1007/978-3-030-19052-1_14 fatcat:jsxrzsldqjbhfpijjoktszyg3e

Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios

Veronique Cortier, Constantin Catalin Dragan, Francois Dupressoir, Bogdan Warinschi
2018 2018 IEEE 31st Computer Security Foundations Symposium (CSF)  
Together, our results yield the first machine-checked analysis of both ballot privacy and verifiability properties for a deployed electronic voting protocol.  ...  Second, we develop a novel framework for proving strong verifiability in EasyCrypt and apply it to Belenios.  ...  We thank the anonymous reviewers and others involved in the peer-reviewing process for helpful suggestions of improvements to the paper and its presentation.  ... 
doi:10.1109/csf.2018.00029 dblp:conf/csfw/CortierDDW18 fatcat:yca5itbsk5conofo547t7nghxy

Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios

Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2021 2021 IEEE 34th Computer Security Foundations Symposium (CSF)  
Election verifiability aims to ensure that the outcome produced by electronic voting systems correctly reflects the intentions of eligible voters, even in the presence of an adversary that may corrupt  ...  We demonstrate its application to the verification of various scenarios in Helios and Belenios, two prominent internet voting systems, for which we capture features and corruption models previously outside  ...  A. Verifiable electronic voting protocols Bulletin board. The main component of an electronic voting protocol is a so-called bulletin board, which we denote by .  ... 
doi:10.1109/csf51468.2021.00019 fatcat:a4udg26fh5cyxfncsuijm2fl6q

Fixing the Achilles Heel of E-Voting: The Bulletin Board

Lucca Hirschi, Lara Schmid, David Basin
2021 2021 IEEE 34th Computer Security Foundations Symposium (CSF)  
In particular, we present novel attacks on the e-voting protocols Belenios, Civitas, and Helios that violate some of their central security claims under realistic system assumptions.  ...  We identify a requirement, called finalagreement, and formally prove that it is sufficient and, in most cases, necessary to achieve verifiability.  ...  To vote, a voter (v1) obtains a private credential from the RTs and (v2) computes a ballot containing: the encrypted vote, the encrypted private credential, and a ZKP of well-formedness.  ... 
doi:10.1109/csf51468.2021.00016 fatcat:vvjnqhvwfraexed7owoso7f5vq

Voting

Véronique Cortier, Joseph Lallemand
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
Electronic voting typically aims at two main security goals: vote privacy and verifiability.  ...  ; and eligibility verifiability (only legitimate voters may vote).  ...  ACKNOWLEDGMENTS The authors would like to thank Esfandiar Mohammadi and the anonymous reviewers for their helpful comments and suggestions that greatly contributed to clarify the notions presented in the  ... 
doi:10.1145/3243734.3243762 dblp:conf/ccs/CortierL18 fatcat:ci3gckt2ijeu3pkfo6r467f2ua

Towards end-to-end verifiable online voting: adding verifiability to established voting systems [article]

Mohammed Alsadi and Matthew Casey and Constantin Catalin Dragan and Francois Dupressoir and Luke Riley and Muntadher Sallal and Steve Schneider and Helen Treharne and Joe Wadsworth and Phil Wright
2021 arXiv   pre-print
a Selene-based verifiability layer and adding it to an operational online voting system.  ...  However, replacing existing online systems with those that provide verifiable voting requires new algorithms and code to be deployed, and this presents a significant business risk to commercial election  ...  This research was funded by EPSRC through the VOLT project EP/P031811/1, with support for development of VMV and integration with the CES system through the Surrey Impact Acceleration Account EP/R511791  ... 
arXiv:1912.00288v2 fatcat:2p5oqx3z5jgwhdeu5g6b52krkm

BeleniosRF

Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We propose a new voting scheme, BeleniosRF, that offers both receipt-freeness and end-to-end verifiability.  ...  Verify(PBB, r, Π), on inputs the public bulletin board PBB and (r, Π), checks whether Π is a valid proof of correct tallying for r. If so, it returns , and ⊥ otherwise.  ...  ), EPSRC grant EP/G037264/1 and COST Action IC1306.  ... 
doi:10.1145/2976749.2978337 dblp:conf/ccs/ChaidosCFG16 fatcat:yx2qf2xx35ewnhfwfycqbvywm4

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

Veronique Cortier, Joseph Lallemand, Bogdan Warinschi
2020 2020 IEEE 33rd Computer Security Foundations Symposium (CSF)  
We propose a framework for the analysis of electronic voting schemes in the presence of malicious bulletin boards.  ...  Our ideal functionalities reflect different adversarial capabilities and restrictions to modify honest votes. Is this a privacy or a verifiability property?  ...  Helios is a simple voting protocol that guarantees privacy and verifiability in a lowcoercion environment.  ... 
doi:10.1109/csf49147.2020.00010 dblp:conf/csfw/CortierLW20 fatcat:giujxltrjjhy5gqs43bjgidl2i

A Formal Analysis of the Neuchatel e-Voting Protocol

Veronique Cortier, David Galindo, Mathieu Turuani
2018 2018 IEEE European Symposium on Security and Privacy (EuroS&P)  
We design a detailed model of the protocol in ProVerif for both privacy and verifiability properties.  ...  In this paper, we study a voting system that has been used for electing political representatives and in citizen-driven referenda in the Swiss canton of Neuchâtel.  ...  Of course, designing and implementing a secure electronic voting system is a difficult task and many attacks or weaknesses have been discovered on deployed systems (see e.g.  ... 
doi:10.1109/eurosp.2018.00037 dblp:conf/eurosp/CortierGT18 fatcat:o6v537b5vbb7nchkvmjmzqxy5q

Towards Verifiable Remote Voting with Paper Assurance [article]

Eleanor McMurtry and Xavier Boyen and Chris Culnane and Kristian Gjøsteen and Thomas Haines and Vanessa Teague
2021 arXiv   pre-print
We propose a protocol for verifiable remote voting with paper assurance.  ...  The system is not end-to-end verifiable, but does allow voters to detect manipulation by an adversary who controls either the voting device, or (the postal service and electoral commission) but not both  ...  We also thank the anonymous reviewers for valuable feedback and corrections.  ... 
arXiv:2111.04210v2 fatcat:mejg4v6n2fhulhdxwteqri6gta

Secure Benchmarking using Electronic Voting

Vivek Agrawal, Einar Arthur Snekkenes
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
We propose a novel approach to solve the security limitations of present benchmarking systems by applying the concepts of electronic voting to benchmark.  ...  The present benchmarking systems do not provide a secure way of exchanging sensitive information between the submitter and the benchmark authority.  ...  The list is by far complete, but we restricted this study to include four electronic voting systems (eVote (Pierro, 2017) , Belenios (Cortier 1.  ... 
doi:10.5220/0006827801910206 dblp:conf/icete/AgrawalS18 fatcat:x3eftogxp5e4lkv2txpagtagyu

When Are Three Voters Enough for Privacy Properties? [chapter]

Myrto Arapinis, Véronique Cortier, Steve Kremer
2016 Lecture Notes in Computer Science  
Protocols for secure electronic voting are of increasing societal importance.  ...  In the case where the protocol allows a voter to cast several votes and counts, e.g., only the last one, we also reduce the number of ballots required for an attack to 10, and under some additional hypotheses  ...  This work has received funding from the European Research Council (ERC) under the EU's Horizon 2020 research and innovation program (grant agreement No 645865-SPOOC) and the ANR project SEQUOIA ANR-14-  ... 
doi:10.1007/978-3-319-45741-3_13 fatcat:tql5vlgrm5gjvfgv5eohqiapz4

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Veronique Cortier, Constantin Catalin Dragan, Francois Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi
2017 2017 IEEE Symposium on Security and Privacy (SP)  
Acknowledgments The authors thank Gilles Barthe for useful input and discussions and to David Bernhard and David Galindo for their early involvement in this work.  ...  This work has received funding from the Office of Naval Research (grant agreement NO N000141512750) and the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation  ...  A single-pass voting system [13] is a tuple of algorithms V = Setup, Vote, Valid, Publish, Tally, Verify .  ... 
doi:10.1109/sp.2017.28 dblp:conf/sp/CortierDDSSW17 fatcat:rqw3ts5xrvdt3apptmje7cc4ii

Electt: running auditable and verifiable elections in untrusted environments [article]

Kirill A. Korinsky
2020 arXiv   pre-print
We present a system for running auditable and verifiable elections in untrusted environments. Votes are anonymous since the order of candidates on a ballot sheet is random.  ...  Candidates and observers can indicate that the election was free and fair by exposing their keys, which are used by the system to decrypt each vote.  ...  For example, Belenios [21] is built upon Helios [22] and is closely related to Benaloh's simple verifiable voting protocol [23] , which itself was partially inspired by the Sako-Kilian mix net [24  ... 
arXiv:2011.10902v2 fatcat:es7aslhgl5epbadvkck7tmxrfe

E-voting system evaluation based on the Council of Europe recommendations: Helios Voting

Luis Panizo Alonso, Mila Gasco, David Yeregui Marcos del Blanco, Jose Angel Hermida Alonso, Jordi Barrat, Hector Alaiz Moreton
2018 IEEE Transactions on Emerging Topics in Computing  
Amongst them, the evaluation and harmonization of e-voting systems, given different legal and statutory frameworks, is still an important challenge to overcome.  ...  the strengths and weaknesses of Helios Voting and, as a result, to improve decision-making processes regarding the type and size of elections that can be securely handled by Helios Voting.  ...  any potential attacks and frauds that could be very difficult to revert once elections are over.  The existence of a traditional voting system which is reasonably simple, intuitive, verifiable and functional  ... 
doi:10.1109/tetc.2018.2881891 fatcat:76q4cdbfwndfndrvjgzyl4bwvi
« Previous Showing results 1 — 15 out of 23 results