Is Benaloh Challenge Suitable
dc.contributor.author | Araujo, Roberto | |
dc.contributor.author | Simplicio, Marcos | |
dc.contributor.author | Cominetti, Eduardo | |
dc.contributor.author | Matias, Paulo | |
dc.contributor.author | Traoré, Jacques | |
dc.contributor.editor | Volkamer, Melanie | |
dc.contributor.editor | Duenas-Cid, David | |
dc.contributor.editor | Rønne, Peter B. | |
dc.contributor.editor | Budurushi, Jurlind | |
dc.contributor.editor | Blom, Michelle | |
dc.contributor.editor | Rodriguez Pérez, Adrià | |
dc.contributor.editor | Spycher-Krivonosova, Iuliia | |
dc.contributor.editor | Martin-Rozumilowicz, Beata | |
dc.contributor.editor | Spycher, Oliver | |
dc.date.accessioned | 2025-02-14T11:23:57Z | |
dc.date.available | 2025-02-14T11:23:57Z | |
dc.date.issued | 2024 | |
dc.description.abstract | A few voting schemes for polling station elections are end-to-end (E2E) verifiable, allowing voters to check if their choices were cast-as-intended and recorded-as-cast. Some solutions rely on the Benaloh challenge, through which voters can spoil their ballots to verify if they were encrypted properly. In this paper, we discuss two potential issues and mitigations when this technique is used for in person voting with direct-recording electronic (DRE) machines: (1) leakage of voters' intentions in some scenarios; and (2) malicious DRE machines gathering statistical data aiming to trick challengers. | en |
dc.identifier.doi | 10.18420/e-vote-id2024_04 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/45863 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik | |
dc.relation.ispartof | E-Vote-ID 2024 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-359 | |
dc.subject | Electronic Voting | |
dc.subject | E2E | |
dc.subject | Benaloh challenge | |
dc.subject | DRE | |
dc.title | Is Benaloh Challenge Suitable | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 65 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 61 | |
gi.conference.date | 2.-4. October 2024 | |
gi.conference.location | Tarragona, Spain | |
gi.conference.review | full | |
gi.conference.sessiontitle | Track 1: Security, Usability and Technical Issues |
Dateien
Originalbündel
1 - 1 von 1