Fifty Shades of Ballot Privacy: Privacy against a Malicious Board


METADATA ONLY
Loading...

Date

2020

Publication Type

Conference Paper

ETH Bibliography

yes

Citations

Altmetric
METADATA ONLY

Data

Rights / License

Abstract

We propose a framework for the analysis of electronic voting schemes in the presence of malicious bulletin boards. We identify a spectrum of notions where the adversary is allowed to tamper with the bulletin board in ways that reflect practical deployment and usage considerations. To clarify the security guarantees provided by the different notions we establish a relation with simulation-based security with respect to a family of ideal functionalities. The ideal functionalities make clear the set of authorised attacker capabilities which makes it easier to understand and compare the associated levels of security. As an application, we study three protocols of the literature (Helios, Belenios, and Civitas) and identify the different levels of privacy they offer.

Publication status

published

Editor

Book title

2020 IEEE 33rd Computer Security Foundations Symposium (CSF)

Journal / series

Volume

Pages / Article No.

17 - 32

Publisher

IEEE

Event

33rd IEEE Computer Security Foundations Symposium (CSF 2020)

Edition / version

Methods

Software

Geographic location

Date collected

Date created

Subject

Organisational unit

Notes

Due to the Corona virus (COVID-19) the conference was conducted virtually.

Funding

Related publications and datasets