Cryptology ePrint Archive: Report 2016/447
Theoretical Attacks on E2E Voting Systems
Peter Hyun-Jeen Lee and Siamak F. Shahandashti
Abstract: We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and attacks aiming at coercion of voters. For each attack, we give a brief overview of the voting system and a short description of the attack and its consequences.
Category / Keywords: cryptographic protocols / election schemes, voting, attacks, integrity, privacy, coercion
Original Publication (in the same form): Real-World Electronic Voting: Design, Analysis and Deployment, Hao and Ryan (eds), Series in Security, Privacy and Trust, CRC Press, 2016.
Date: received 5 May 2016
Contact author: siamak f s at gmail com
Available format(s): PDF | BibTeX Citation
Note: This is a personally archived version of a chapter by the same title contributed to the book "Real-World Electronic Voting: Design, Analysis and Deployment", Feng Hao and Peter Y.\ A.\ Ryan (editors), Series in Security, Privacy and Trust, CRC Press, 2016.
Version: 20160506:080021 (All versions of this report)
Short URL: ia.cr/2016/447
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]