Paper 2016/447
Theoretical Attacks on E2E Voting Systems
Peter Hyun-Jeen Lee and Siamak F. Shahandashti
Abstract
We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and attacks aiming at coercion of voters. For each attack, we give a brief overview of the voting system and a short description of the attack and its consequences.
Note: This is a personally archived version of a chapter by the same title contributed to the book "Real-World Electronic Voting: Design, Analysis and Deployment", Feng Hao and Peter Y.\ A.\ Ryan (editors), Series in Security, Privacy and Trust, CRC Press, 2016.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Real-World Electronic Voting: Design, Analysis and Deployment, Hao and Ryan (eds), Series in Security, Privacy and Trust, CRC Press, 2016.
- Keywords
- election schemesvotingattacksintegrityprivacycoercion
- Contact author(s)
- siamak f s @ gmail com
- History
- 2016-05-06: received
- Short URL
- https://ia.cr/2016/447
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/447, author = {Peter Hyun-Jeen Lee and Siamak F. Shahandashti}, title = {Theoretical Attacks on {E2E} Voting Systems}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/447}, year = {2016}, url = {https://eprint.iacr.org/2016/447} }