About
24
Publications
4,664
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
137
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (24)
The authors of this paper had the opportunity to closely accompany the CHVote project of the State of Geneva during more than two years and to continue the project after its abrupt stop in 2018. This paper is an experience report from this collaboration and the subsequent project continuation. It describes the lessons learned from this project and...
Der Einsatz elektronischer Wahlsysteme oder E-Voting-Systeme bei politischen Abstimmungen oder Wahlen wird sowohl unter Fachleuten wie auch unter Bürgerinnen und Bürger kontrovers diskutiert. Die einen sehen E-Voting-Systeme als eine natürliche Weiterentwicklung verbreiterter Dienste wie E-Shopping oder E-Banking, während bei den anderen die möglic...
This document provides a self-contained, comprehensive, and fully-detailed specification of a new cryptographic voting protocol for the future system of the State of Geneva. The document describes every relevant aspect and every necessary technical detail of the computations and communications performed by the participants during the protocol execu...
Die Autoren vergleichen den brieflichen mit dem elektronischen Stimmkanal betreffend Überprüfbarkeit, Sicherheit und Qualität der Stimmabgabe. In dieser Auslegeordnung unterscheiden sie, was jeweils vor, während und nach der Abstimmung geschieht. E-Voting führt im Wahl- und Abstimmungsprozedere zu Veränderungen in folgenden Punkten: Harmonisierung...
Implementing the shuffle proof of a verifiable mix-net is one of the most challenging tasks in the implementation of an electronic voting system. For non-specialists, even if they are experienced software developers, this task is nearly impossible to fulfill without spending an enormous amount of resources into studying the necessary cryptographic...
In this paper, we propose a new method for cast-as-intended verification in remote electronic voting. We consider a setting, in which voters receive personalized verification code sheets from the authorities over a secure channel. If the codes displayed after submitting a ballot correspond to the codes printed on the code sheet, a correct ballot mu...
Das Internet ist omnipräsent. Informationen werden selektiv abgerufen, gespeichert, verwertet und gestreut, und sie können so für demokratische Prozesse verwendet werden. Verschiedene Instrumente stehen zur Verfügung, um Informationen gezielt in Facebook-Gruppen, Foren, Twitter-Kanälen oder Blogs breit zu streuen. Dank E-Voting werden politische En...
Eine kritische Grundhaltung gegenüber elektronischen Wahlsystemen ist angebracht, denn die Gefahr der unentdeckten Verfälschung von Stimm- oder Wahlergebnissen ist real. Andererseits ermöglichen elektronische Wahlsysteme die zeit- und ortsunabhängige Abgabe der Stimme, sie können die Qualität der Stimmen erhöhen und die Akzeptanz der Endergebnisse...
Technical research has achieved strong advances in addressing security concerns in internet voting, yet the solutions are complicated and difficult to explain to the public. Accordingly, internet voting commonly faces opposition despite the benefits voters and authorities may expect. It appears that security features are only one premise underlying...
Vertrauensbildende Massnahmen für elektronische Verfahren bei Wahlen und Abstimmungen helfen, mögliche Zweifel der Wählerschaft an der Wahrung des Stimmgeheimnisses und der Korrektheit des Ergebnisses auszuräumen. Transparenz, Aufgaben- trennung, Verifizierbarkeit, Überschreiben der Stimme, unabhängige Software und Sicherheitsevaluierung sind einig...
This paper proposes hybrid voting systems as a solution for the vote buying and voter coercion problem of electronic voting systems. The key idea is to allow voters to revoke and overrule their electronic votes at the polling station. We analyze the potential and pitfalls of such revocation procedures and give concrete recommendations on how to bui...
In this paper, we demonstrate that e-voting protocols based on threshold blind signatures from multiple authorities allow a coalition of eligible voters to cast more than votes. This property presents a serious violation of the principles of democracy in the voting process. We analyze the applicability of this violation and provide a generic soluti...
Status: [Final] Class: [Public] File: fidis-wp17-del17.1 Applicability_v1.0.doc Summary The objective of this document is to illustrate the applicability of the model based on virtual persons, model developed in FIDIS deliverable D2.13. First, typical use-cases are described using the model based on virtual persons as well as the traditional one-to...
Implementation strategies for LOTOS specifications can be based on the notion of refining an initial abstract specification into an implementation near specification, which is easily translated (compiled) into the required target programming language. We identify two subphases to this process (implementation phase), the first being the refinement o...
This paper presents a hybrid e-voting system, in which a transparent e-voting protocol is embedded in a traditional paper-based voting procedure. To guarantee vote anonymity, the protocol itself is based on a scalable blind signature scheme with multiple authorities. An anonymous channel is used to cast the encrypted votes onto the public board. To...