Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
METADATA ONLY
Loading...
Author / Producer
Date
2020
Publication Type
Conference Paper
ETH Bibliography
yes
Citations
Altmetric
METADATA ONLY
Data
Rights / License
Abstract
We propose a framework for the analysis of electronic voting schemes in the presence of malicious bulletin boards. We identify a spectrum of notions where the adversary is allowed to tamper with the bulletin board in ways that reflect practical deployment and usage considerations. To clarify the security guarantees provided by the different notions we establish a relation with simulation-based security with respect to a family of ideal functionalities. The ideal functionalities make clear the set of authorised attacker capabilities which makes it easier to understand and compare the associated levels of security. As an application, we study three protocols of the literature (Helios, Belenios, and Civitas) and identify the different levels of privacy they offer.
Permanent link
Publication status
published
External links
Editor
Book title
2020 IEEE 33rd Computer Security Foundations Symposium (CSF)
Journal / series
Volume
Pages / Article No.
17 - 32
Publisher
IEEE
Event
33rd IEEE Computer Security Foundations Symposium (CSF 2020)
Edition / version
Methods
Software
Geographic location
Date collected
Date created
Subject
Organisational unit
Notes
Due to the Corona virus (COVID-19) the conference was conducted virtually.