Paper 2016/447

Theoretical Attacks on E2E Voting Systems

Peter Hyun-Jeen Lee and Siamak F. Shahandashti

Abstract

We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and attacks aiming at coercion of voters. For each attack, we give a brief overview of the voting system and a short description of the attack and its consequences.

Note: This is a personally archived version of a chapter by the same title contributed to the book "Real-World Electronic Voting: Design, Analysis and Deployment", Feng Hao and Peter Y.\ A.\ Ryan (editors), Series in Security, Privacy and Trust, CRC Press, 2016.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Real-World Electronic Voting: Design, Analysis and Deployment, Hao and Ryan (eds), Series in Security, Privacy and Trust, CRC Press, 2016.
Keywords
election schemesvotingattacksintegrityprivacycoercion
Contact author(s)
siamak f s @ gmail com
History
2016-05-06: received
Short URL
https://ia.cr/2016/447
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/447,
      author = {Peter Hyun-Jeen Lee and Siamak F.  Shahandashti},
      title = {Theoretical Attacks on {E2E} Voting Systems},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/447},
      year = {2016},
      url = {https://eprint.iacr.org/2016/447}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.