• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

Attacking and fixing helios: An analysis of ballot secrecy (2010)

Cached

  • Download as a PDF

Download Links

  • [www.bensmyth.com]
  • [www.bensmyth.com]
  • [www.loria.fr]
  • [www.bensmyth.com]
  • [eprint.iacr.org]
  • [www.bensmyth.com]
  • [www.lsv.ens-cachan.fr]
  • [eprint.iacr.org]
  • [www.bensmyth.com]
  • [eprint.iacr.org]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Véronique Cortier , Ben Smyth
Citations:36 - 16 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Cortier10attackingand,
    author = {Véronique Cortier and Ben Smyth},
    title = {Attacking and fixing helios: An analysis of ballot secrecy},
    year = {2010}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Helios 2.0 is an open-source web-based end-toend verifiable electronic voting system, suitable for use in lowcoercion environments. In this paper, we analyse ballot secrecy and discover a vulnerability which allows an adversary to compromise the privacy of voters. This vulnerability has been successfully exploited to break privacy in a mock election using the current Helios implementation. Moreover, the feasibility of an attack is considered in the context of French legislative elections and, based upon our findings, we believe it constitutes a real threat to ballot secrecy in such settings. Finally, we present a fix and show that our solution satisfies a formal definition of ballot secrecy using the applied pi calculus.

Keyphrases

ballot secrecy    applied pi calculus    lowcoercion environment    french legislative election    mock election    current helios implementation    formal definition    real threat   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University