Cryptology ePrint Archive: Report 2016/447

Theoretical Attacks on E2E Voting Systems

Peter Hyun-Jeen Lee and Siamak F. Shahandashti

Abstract: We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and attacks aiming at coercion of voters. For each attack, we give a brief overview of the voting system and a short description of the attack and its consequences.

Category / Keywords: cryptographic protocols / election schemes, voting, attacks, integrity, privacy, coercion

Original Publication (in the same form): Real-World Electronic Voting: Design, Analysis and Deployment, Hao and Ryan (eds), Series in Security, Privacy and Trust, CRC Press, 2016.

Date: received 5 May 2016

Contact author: siamak f s at gmail com

Available format(s): PDF | BibTeX Citation

Note: This is a personally archived version of a chapter by the same title contributed to the book "Real-World Electronic Voting: Design, Analysis and Deployment", Feng Hao and Peter Y.\ A.\ Ryan (editors), Series in Security, Privacy and Trust, CRC Press, 2016.

Version: 20160506:080021 (All versions of this report)

Short URL: ia.cr/2016/447

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]