Abstract
There have been significant advances in recent years in the development of highassurance voting systems [1,2,3,4]. However, despite formal proofs of the technical core of such protocols, wider analysis continues to throw up a remarkable array of threats and attacks against voting systems, many non-technical [5,6].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy 2, 38–47 (2004)
Neff, A.: Practical high certainty intent verification for encrypted votes (2004), http://www.votehere.net/documentation/vhti
Ryan, P.Y.A.: A variant of the Chaum voting scheme. Technical Report CS-TR-864, University of Newcastle (2004)
Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005)
Karlof, C., Sastry, N., Wagner, D.: Cryptographic Voting Protocols: A systems perspective. In: USENIX Security Symposium (2005)
Ryan, P.Y.A., Peacock, T.: Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle (2005)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 244–251. ACM, New York (1992)
Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.Y.A.: Opacity generalised to transition systems. International Journal of Information Security 7(6), 421–435 (2008)
Araújo, R., Custódio, R.F., van de Graaf, J.: A verifiable voting protocol based on Farnel. In: IAVoSS Workshop On Trustworthy Elections, WOTE 2007 (June 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ryan, P.Y.A. (2011). Remodelling the Attacker in Voting Protocols. In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds) Security Protocols XVI. Security Protocols 2008. Lecture Notes in Computer Science, vol 6615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22137-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-22137-8_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22136-1
Online ISBN: 978-3-642-22137-8
eBook Packages: Computer ScienceComputer Science (R0)