A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Verifiable secret-ballot elections
Verifiable secret-ballot elections
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
Knowledge-based modelling of voting protocols
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Verifying privacy-type properties of electronic voting protocols
Journal of Computer Security
Bingo voting: secure and coercion-free voting using a trusted random number generator
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Election verifiability in electronic voting protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Formalization of Receipt-Freeness in the Context of Electronic Voting
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
ISC'06 Proceedings of the 9th international conference on Information Security
Analysis of an electronic voting protocol in the applied pi calculus
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
A practical voter-verifiable election scheme
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Towards Trustworthy Elections
Hi-index | 0.00 |
Trust in an electronic voting system is an essential premise for electronic elections. Trust in a system can be strengthened by controlling its correct functioning. There are two ways to assure the correct functioning of a system. Firstly, before using a system, neutral experts can evaluate and certify the security of its implementation. Secondly, while using the system, its users can verify its outcome by appropriate verification tools. Verifiability is a specific security function, which is subject to certification itself. This paper presents a formal security requirements model for the verifiability of electronic voting systems by means of a Bulletin Board that publishes all important communication steps without violating the secrecy of voting.