Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

Veronique Cortier, Joseph Lallemand, Bogdan Warinschi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

We propose a framework for the analysis of electronic voting schemes in the presence of malicious bulletin boards. We identify a spectrum of notions where the adversary is allowed to tamper with the bulletin board in ways that reflect practical deployment and usage considerations. To clarify the security guarantees provided by the different notions we establish a relation with simulation-based security with respect to a family of ideal functionalities. The ideal functionalities make clear the set of authorised attacker capabilities which makes it easier to understand and compare the associated levels of security. As an application, we study three protocols of the literature (Helios, Belenios, and Civitas) and identify the different levels of privacy they offer.
Original languageEnglish
Title of host publication2020 IEEE 33rd Computer Security Foundations Symposium
PublisherIEEE Computer Society
Publication statusPublished - 22 Jun 2020

Fingerprint

Dive into the research topics of 'Fifty Shades of Ballot Privacy: Privacy against a Malicious Board'. Together they form a unique fingerprint.

Cite this