Election Verifiability for Helios under Weaker Trust Assumptions
- Submitting institution
-
The University of Birmingham
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 24114477
- Type
- E - Conference contribution
- DOI
-
10.1007/978-3-319-11212-1_19
- Title of conference / published proceedings
- Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II
- First page
- 327
- Volume
- 8713
- Issue
- -
- ISSN
- 0302-9743
- Open access status
- Out of scope for open access requirements
- Month of publication
- -
- Year of publication
- 2014
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
-
- Citation count
- 30
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- Most electronic voting protocols aim to provide verifiability: voters should trust the result without having to rely on some authority. Our work introduces a simple verifiability definition that is easily applicable. Both our definition and our newly derived protocol Belenios, which enjoys stronger verifiability than the prominent voting system Helios, have been extensively used in subsequent research, including work published at the flagship security conferences IEEE Security and Privacy and ACM CCS. Our protocol underlies the open-source voting system http://www.belenios.org/ that has been employed in more than 200 elections, in academia, education and sports associations.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -