Paper 2015/558

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, and Philemon von Bergen


Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. secrecy and integrity of cast votes. A new and promising application area of electronic voting is boardroom voting, which in practice takes place very frequently and often on simple issues such as approving or refusing a budget. Hence, it is not a surprise that a number of cryptographic protocols for boardroom voting have been already proposed. In this work, we introduce a security model adequate for the boardroom voting context. Further, we evaluate the efficiency of four boardroom voting protocols, which to best of our knowledge are the only boardroom voting protocols that satisfy our security model. Finally, we compare the performance of these protocols in different election settings.

Available format(s)
Publication info
Published elsewhere. Major revision. 10th International Conference on Availability, Reliability and Security (ARES 2015)
electronic voting
Contact author(s)
oksana kulyk @ secuso org
2015-06-17: received
Short URL
Creative Commons Attribution


      author = {Oksana Kulyk and Stephan Neumann and Jurlind Budurushi and Melanie Volkamer and Rolf Haenni and Reto Koenig and Philemon von Bergen},
      title = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting},
      howpublished = {Cryptology ePrint Archive, Paper 2015/558},
      year = {2015},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.