Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security proofs for Participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
University of Bristol, UK.
Technische Universität Darmstadt, Germany.
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Technische Universität Darmstadt, Germany. (PriSec)ORCID iD: 0000-0003-2674-4043
2017 (English)In: ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security, New York: Association for Computing Machinery (ACM), 2017, article id UNSP 1Conference paper, Published paper (Refereed)
Abstract [en]

The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy. However, depending on its version, the scheme provides either participation privacy (hiding who participated in the election) or verifiability against malicious bulletin board (preventing election manipulation by ballot stuffing), but not both at the same time. It also does not provide receipt-freeness, thus enabling vote buying by letting the voters construct receipts proving how they voted. Recently, an extension to Helios, further referred to as KTV-Helios, has been proposed that claims to provide these additional security properties. However, the authors of KTV-Helios did not prove their claims. Our contribution is to provide formal definitions for participation privacy and receipt-freeness that we applied to KTV-Helios. In order to evaluate the fulfillment of participation privacy and receipt-freeness, we furthermore applied the existing definition of ballot privacy, which was also used for evaluating the security of Helios, in order to show that ballot privacy also holds for KTV-Helios

Place, publisher, year, edition, pages
New York: Association for Computing Machinery (ACM), 2017. article id UNSP 1
National Category
Computer Sciences Other Computer and Information Science Computer Engineering Computer Systems
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-65601DOI: 10.1145/3098954.3098990ISI: 000426964900001ISBN: 978-1-4503-5257-4 (electronic)OAI: oai:DiVA.org:kau-65601DiVA, id: diva2:1174180
Conference
ARES'17 the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29-September 01, 2017
Available from: 2018-01-15 Created: 2018-01-15 Last updated: 2018-10-05Bibliographically approved

Open Access in DiVA

fulltext(555 kB)7 downloads
File information
File name FULLTEXT01.pdfFile size 555 kBChecksum SHA-512
5ea912089564c94a8206feeac901dc013cdb7a98c1a988f1b42768e94c237ca5802aaddea76a0ab7a574b8e2a6cbcef595f7ddd1d73c1c7e0603d2271c7e527c
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Search in DiVA

By author/editor
Volkamer, Melanie
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer SciencesOther Computer and Information ScienceComputer EngineeringComputer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 7 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 17 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf