Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978337
|View full text |Cite
|
Sign up to set email alerts
|

BeleniosRF

Abstract: We propose a new voting scheme, BeleniosRF, that offers both receipt-freeness and end-to-end verifiability. It is receipt-free in a strong sense, meaning that even dishonest voters cannot prove how they voted. We provide a game-based definition of receipt-freeness for voting protocols with non-interactive ballot casting, which we name strong receipt-freeness (sRF). To our knowledge, sRF is the first game-based definition of receipt-freeness in the literature, and it has the merit of being particularly concise … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 48 publications
(13 citation statements)
references
References 47 publications
0
13
0
Order By: Relevance
“…8 Observe that n repl ≪ n h V covers the interesting cases because the privacy loss is obviously close to 1 for large n repl . e.g., [5,13,26,10]-reduce to the entropy-based approach, as proven in [5]). In this section we will show that a simple extension of the KTV definition, which we term 'strong vote privacy', is equivalent to a computational version of a strong entropy-based definition.…”
Section: Strong Vote Privacymentioning
confidence: 90%
See 3 more Smart Citations
“…8 Observe that n repl ≪ n h V covers the interesting cases because the privacy loss is obviously close to 1 for large n repl . e.g., [5,13,26,10]-reduce to the entropy-based approach, as proven in [5]). In this section we will show that a simple extension of the KTV definition, which we term 'strong vote privacy', is equivalent to a computational version of a strong entropy-based definition.…”
Section: Strong Vote Privacymentioning
confidence: 90%
“…In what follows, we explain the general idea of such homomorphic replay attacks. Several e-voting schemes are vulnerable to such homomorphic replay attacks, for example the one by Lee et al [34] (pointed out by Dreier, Lafourcade and Lakhnech [19]), or the one by Blazy, Fuchsbauer, Pointcheval, and Vergnaud [8] (pointed out by Chaidos, Cortier, Fuchsbauer, and Galindo [13]) which is the predecessor of BeleniosRF [13].…”
Section: Homomorphic Replay Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Since, realistically, the risk of being penalized may not be sufficient to deter possible coercers, the threat of coercion must also be counteracted at a technical level. To this end, numerous e-voting systems have been designed that aim to protect against coercion (see, e.g., [1,2,6,7,12,17,22,32]), or to mitigate its risk (see, e.g., [5,14,20,28,29]), by technical means. This property is called coercion-resistance.…”
Section: Introductionmentioning
confidence: 99%