Security analysis of the Estonian internet voting system

D Springall, T Finkenauer, Z Durumeric… - … Security, 2014 - dl.acm.org
… It also carries an elevated possibility of detection if used on a large scale, since some voters
may attempt verification with devices owned by others. However, it illustrates that as the PC …

Analysis of an electronic voting system

T Kohno, A Stubblefield, AD Rubin… - … on Security and …, 2004 - ieeexplore.ieee.org
… We present a security analysis of the source code to one … Our analysis shows that this voting
system is far below even … on a very large scale, as the central distribution point(s) for ballot

SEAS, a secure e-voting protocol: design and implementation

F Baiardi, A Falleni, R Granchi, F Martinelli… - … & Security, 2005 - Elsevier
… e-voting systems to large scale public elections, given the unquestionable nature that these
elections must have. Thus, an e-voting system for … of e-voting systems to large scale elections …

A simple publicly verifiable secret sharing scheme and its application to electronic voting

B Schoenmakers - Annual International Cryptology Conference, 1999 - Springer
scheme we get a simple and efficient election scheme. This is not the case for the PVSS
schemes of [… For large-scale elections, such a key generation protocol is affordable, as it reduces …

A verifiable secret shuffle and its application to e-voting

CA Neff - … on Computer and Communications Security, 2001 - dl.acm.org
election schemes. The output of the shuffle operation is another sequence of k modular integers,
each of which is the same secret power of a corresponding input element, but the order …

Efficient receipt-free voting based on homomorphic encryption

M Hirt, K Sako - International Conference on the Theory and …, 2000 - Springer
… their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the
multi-authority voting … A practical secret voting scheme for large scale elections. In Advances in …

Sensus: A security-conscious electronic polling system for the internet

LF Cranor, RK Cytron - … International Conference on system …, 1997 - ieeexplore.ieee.org
… Furthermore, we believe our implementation could accommodate largescale elections with
… In this section we provide a brief analysis of several other cryptographic election protocols as …

A proposal of blockchain-based electronic voting system

CK Adiputra, R Hjort, H Sato - … smart trends in systems, security …, 2018 - ieeexplore.ieee.org
… using that system as our baseline of a real, working evoting system in this paper. … voting
schemes for large scale elections,” in Proceedings of the 5th International Workshop on Security

[PDF][PDF] Sybil-Resilient Online Content Voting.

DN Tran, B Min, J Li, L Subramanian - NSDI, 2009 - usenix.org
… -vote real users by creating many Sybil identities. In this paper, we present SumUp, a Sybilresilient
vote aggregation systemvote flow aggregation to limit the number of bogus votes cast …

[PDF][PDF] Towards trustworthy online voting

A Alkassar, AR Sadeghi, S Schultz… - … and System Security …, 2006 - academia.edu
… secure operating systems, we believe that Online Voting should not be applied at least at a
large scale such as for any parliamentary elections without a trustworthy computing platform. …