A verifiable secret shuffle and its application to e-voting
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Government: a better ballot box?
IEEE Spectrum - The amazing vanishing transistor act
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking
Proceedings of the 11th USENIX Security Symposium
A variant of the Chaum voter-verifiable scheme
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Secret-Ballot Receipts: True Voter-Verifiable Elections
IEEE Security and Privacy
Scratch & vote: self-contained paper-based cryptographic voting
Proceedings of the 5th ACM workshop on Privacy in electronic society
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
Casting votes in the auditorium
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Ballot casting assurance via voter-initiated poll station auditing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Bare-handed electronic voting with pre-processing
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Collusion-Free Protocols in the Mediated Model
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Human Readable Paper Verification of Prêt à Voter
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
An Open Framework for Remote Electronic Elections
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
VoteBox: a tamper-evident, verifiable electronic voting system
SS'08 Proceedings of the 17th conference on Security symposium
Administrative and public verifiability: can we have both?
EVT'08 Proceedings of the conference on Electronic voting technology
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
EVT'08 Proceedings of the conference on Electronic voting technology
Coercion-resistant tallying for STV voting
EVT'08 Proceedings of the conference on Electronic voting technology
A secure and anonymous voter-controlled election scheme
Journal of Network and Computer Applications
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
The Append-Only Web Bulletin Board
Formal Aspects in Security and Trust
Verifying privacy-type properties of electronic voting protocols
Journal of Computer Security
A Practical Approach to a Reliable Electronic Election
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Improving and Simplifying a Variant of Prêt à Voter
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Proceedings of the 3rd international conference on Theory and practice of electronic governance
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Prêt à voter: a voter-verifiable voting system
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Shuffle-sum: coercion-resistant verifiable tallying for STV voting
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Enhancing electronic voting machines on the example of Bingo voting
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Verifiable internet voting solving secure platform problem
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Short ballot assumption and threeballot voting protocol
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Bingo voting: secure and coercion-free voting using a trusted random number generator
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
A simple technique for safely using Punchscan and Prêt à Voter in mail-in elections
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Threat analysis of a practical voting scheme with receipts
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Experiences Gained from the first Prêt à Voter Implementation
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
Towards a Framework on the Security Requirements for Electronic Voting Protocols
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
Towards trustworthy e-voting using paper receipts
Computer Standards & Interfaces
Electing a university president using open-audit voting: analysis of real-world use of Helios
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Efficient receipt-free ballot casting resistant to covert channels
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
On subliminal channels in encrypt-on-cast voting systems
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Ballot permutations in prêt à voter
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Accountability: definition and relationship to verifiability
Proceedings of the 17th ACM conference on Computer and communications security
Clearvote: an end-to-end voting system that distributes privacy between printers
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Lagrangian e-voting: verifiability on demand and strong privacy
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Universally composable incoercibility
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Election verifiability in electronic voting protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A hybrid method to detect deflation fraud in cost-per-action online advertising
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Performance requirements for end-to-end verifiable elections
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Eperio: mitigating technical complexity in cryptographic election verification
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
A model for system-based analysis of voting systems
Proceedings of the 15th international conference on Security protocols
Stamp-it: a method for enhancing the universal verifiability of E2E voting systems
ICISS'10 Proceedings of the 6th international conference on Information systems security
Anonymity and verifiability in voting: understanding (un)linkability
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Remodelling the attacker in voting protocols
Security'08 Proceedings of the 16th International conference on Security protocols
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Prêt à voter with confirmation codes
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Kleptographic attacks on e-voting schemes
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Prêt à voter with re-encryption mixes
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Coercion-resistant electronic elections
Towards Trustworthy Elections
A secure architecture for voting electronically (SAVE)
Towards Trustworthy Elections
A threat analysis of prêt à voter
Towards Trustworthy Elections
Towards Trustworthy Elections
Component based electronic voting systems
Towards Trustworthy Elections
Scratch, click & vote: e2e voting over the internet
Towards Trustworthy Elections
Attacking paper-based e2e voting systems
Towards Trustworthy Elections
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Selections: internet voting with over-the-shoulder coercion-resistance
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
ACM SIGAPP Applied Computing Review
Integrity of electronic voting systems: fallacious use of cryptography
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Prêt à Voter with Paillier encryption
Mathematical and Computer Modelling: An International Journal
Using Prêt à Voter in Victorian state elections
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Coercion-resistant electronic elections with write-in candidates
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
The norwegian internet voting protocol
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Linear logical voting protocols
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
An efficient and highly sound voter verification technique and its implementation
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Single layer optical-scan voting with fully distributed trust
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Feasibility analysis of Prêt à voter for german federal elections
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Trivitas: voters directly verifying votes
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Practical Internet voting system
Journal of Network and Computer Applications
An improved electronic voting scheme without a trusted random number generator
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Remotegrity: design and use of an end-to-end verifiable remote voting system
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Dispute resolution in accessible voting systems: the design and use of audiotegrity
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Prêt à voter providing everlasting privacy
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
A practical coercion resistant voting scheme revisited
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Attacking and fixing Helios: An analysis of ballot secrecy
Journal of Computer Security
Hi-index | 0.00 |
We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the voting system. The scheme also seeks to make the voter interface as familiar as possible.