Skip to main content

Remodelling the Attacker in Voting Protocols

  • Conference paper
Security Protocols XVI (Security Protocols 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6615))

Included in the following conference series:

  • 510 Accesses

Abstract

There have been significant advances in recent years in the development of highassurance voting systems [1,2,3,4]. However, despite formal proofs of the technical core of such protocols, wider analysis continues to throw up a remarkable array of threats and attacks against voting systems, many non-technical [5,6].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy 2, 38–47 (2004)

    Article  Google Scholar 

  2. Neff, A.: Practical high certainty intent verification for encrypted votes (2004), http://www.votehere.net/documentation/vhti

  3. Ryan, P.Y.A.: A variant of the Chaum voting scheme. Technical Report CS-TR-864, University of Newcastle (2004)

    Google Scholar 

  4. Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Karlof, C., Sastry, N., Wagner, D.: Cryptographic Voting Protocols: A systems perspective. In: USENIX Security Symposium (2005)

    Google Scholar 

  6. Ryan, P.Y.A., Peacock, T.: Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle (2005)

    Google Scholar 

  7. Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 244–251. ACM, New York (1992)

    Google Scholar 

  8. Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.Y.A.: Opacity generalised to transition systems. International Journal of Information Security 7(6), 421–435 (2008)

    Article  Google Scholar 

  9. Araújo, R., Custódio, R.F., van de Graaf, J.: A verifiable voting protocol based on Farnel. In: IAVoSS Workshop On Trustworthy Elections, WOTE 2007 (June 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ryan, P.Y.A. (2011). Remodelling the Attacker in Voting Protocols. In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds) Security Protocols XVI. Security Protocols 2008. Lecture Notes in Computer Science, vol 6615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22137-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22137-8_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22136-1

  • Online ISBN: 978-3-642-22137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics