, Belenios -Verifiable online voting system
, Exigences techniques et administratives applicables au vote électronique. Chancellerie fédérale ChF, 2014.
Helios: Web-based open-audit voting, 17th USENIX Security Symposium (Usenix'08), pp.335-348, 2008. ,
Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. Usenix, vol.8, 2009. ,
When are three voters enough for privacy properties?, 21st European Symposium on Research in Computer Security (Esorics'16), vol.9879, pp.241-260, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01351398
EasyCrypt: A tutorial, Foundations of Security Analysis and Design (FOSAD'13), pp.146-166, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01114366
STAR-Vote: A secure, transparent, auditable, and reliable voting system, Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE'13), 2013. ,
Random oracles are practical: A paradigm for designing efficient protocols, ACM-CCS'93, 1993. ,
Simple verifiable elections, USENIX Security Symposium (EVT'06), 2006. ,
A comprehensive analysis of game-based ballot privacy definitions, 36th IEEE Symposium on Security and Privacy (S&P'15), pp.499-516, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01206289
How not to prove yourself: Pitfalls of the Fiat-Shamir heuristic and applications to Helios, Advances in Cryptology -ASIACRYPT 2012, vol.7658, pp.626-643, 2012. ,
Automatic verification of security protocols in the symbolic model: The verifier ProVerif, Foundations of Security Analysis and Design (FOSAD'13), vol.8604, pp.54-87, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01102136
Signatures on randomizable ciphertexts, Public Key Cryptography -PKC 2011, pp.403-422, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00542643
BeleniosRF: A non-interactive receipt-free electronic voting scheme, 23rd ACM Conference on Computer and Communications Security (CCS'16), pp.1614-1625, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01377917
Civitas: Toward a secure voting system, IEEE Symposium on Security and Privacy (S&P'08), pp.354-368, 2008. ,
Machine-checked proofs for electronic voting: privacy and verifiability for Belenios, 31st IEEE Computer Security Foundations Symposium (CSF'18), pp.298-312, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01900081
Distributed ElGamal à la Pedersen -application to Helios, Workshop on Privacy in the Electronic Society (WPES 2013), 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00881076
Election verifiability for Helios under weaker trust assumptions, 19th European Symposium on Research in Computer Security (ESORICS'14), vol.8713, pp.327-344, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01011294
SoK: Verifiability notions for e-voting protocols, 36th IEEE Symposium on Security and Privacy (S&P'16), pp.779-798, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01280445
Voting: You can't have privacy without individual verifiability, 25th ACM Conference on Computer and Communications Security (CCS'18), pp.53-66, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01900086
Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013. ,
URL : https://hal.archives-ouvertes.fr/inria-00638556
Election verifiability or ballot privacy: Do we need to choose?, 18th European Symposium on Research in Computer Security (ESORICS'13), pp.481-498, 2013. ,
Design and formal analysis of security protocols, an application to electronic voting and mobile payment, 2018. ,
URL : https://hal.archives-ouvertes.fr/tel-01862680
Neuchâtel's cast-asintended verification mechanism, 5th International Conference on E-Voting and Identity, pp.3-18, 2015. ,
Some ZK security proofs for Belenios, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01576379
Belenios specification -version 1, 2018. ,
CHVote system specification. Cryptology ePrint Archive, 2017. ,
The New South Wales iVote system: Security failures and verification flaws in a live online election, 5th International Conference on E-voting and Identity (VoteID '15), 2015. ,
Coercion-resistant electronic elections, Workshop on Privacy in the Electronic Society (WPES'05), pp.61-70, 2005. ,
DEMOS-2: Scalable E2E verifiable elections without random oracles, ACM Conference on Computer and Communications Security (CCS'15), 2015. ,
sElect: A lightweight verifiable remote voting system, 29th IEEE Computer Security Foundations Symposium (CSF'16), pp.341-354, 2016. ,
Accountabiliy: Definition and relationship to verifiability, 17th ACM Conference on Computer and Communications Security (CCS'10), pp.526-535, 2010. ,
Receipt-free universally-verifiable voting with everlasting privacy, CRYPTO 2006, vol.4117, pp.373-392, 2006. ,
Non-interactive and information-theoretic secure verifiable secret sharing, CRYPTO 1991, pp.129-140, 1991. ,
Prêt à Voter with Paillier encryption, Mathematical and Computer Modelling, vol.48, issue.9, pp.1646-1662, 2008. ,
Selene: Voting with transparent verifiability and coercion-mitigation, 1st Workshop on Secure Voting Systems (VOTING'16), pp.176-192, 2016. ,
Automated analysis of Diffie-Hellman protocols and advanced security properties, 25th IEEE Computer Security Foundations Symposium (CSF'12), pp.78-94, 2012. ,
Security analysis of the Estonian Internet voting system, 11th ACM Conference on Computer and Communications Security (CCS'04), pp.703-715, 2004. ,
Dependent types and multi-monadic effects in F*, 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16), pp.256-270, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01265793
Attacking the Washington, D.C. Internet voting system, Financial Cryptography and Data Security (FC'12), 2012. ,