E. I. Committee, Statistics about Internet voting in Estonia

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.703-715, 2014.
DOI : 10.1145/2660267.2660315

J. A. Halderman and V. Teague, The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election, 1504.
DOI : 10.1007/978-3-319-22270-7_3

L. Grégoire, Comment mon ordinateur a votévoté`votéà ma place (etàet`età mon insu), 2012.

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

M. Backes, C. Hrit¸cuhrit¸cu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.
DOI : 10.1109/CSF.2008.26

R. Küsters, T. Truderung, and A. Vogt, Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, 2011 IEEE Symposium on Security and Privacy, pp.538-553, 2011.
DOI : 10.1109/SP.2011.21

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions, 2015 IEEE Symposium on Security and Privacy
DOI : 10.1109/SP.2015.37

R. L. Rivest and J. P. Wack, On the notion of 'software independence' in voting systems, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.2, issue.1881, 2006.
DOI : 10.1098/rsta.2008.0149

D. Chaum, Surevote: Technical overview, Proc. Workshop on Trustworthy Elections (WOTE'01), 2001.

P. Y. Ryan and V. Teague, Pretty good democracy, Proc. 17th International Workshop on Security Protocols. Revised Selected Papers, pp.111-130, 2009.

]. J. Benaloh, Simple verifiable elections, Proc

B. Adida, Helios: Web-based open-audit voting, Proc. 17th USENIX Security Symposium, pp.335-348, 2008.

F. Karayumak, M. M. Olembo, M. Kauer, and M. Volkamer, Usability analysis of helios -an open source verifiable remote electronic voting system, Proc. Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE'11), 2011.

R. Haenni and R. Koenig, Design, Development, and Use of Secure Electronic Voting Systems, 2014.

G. S. Grewal, M. Ryan, L. Chen, and M. Clarkson, Du-Vote: Remote Electronic Voting with Untrusted Computers, 2015 IEEE 28th Computer Security Foundations Symposium, pp.155-169, 2015.
DOI : 10.1109/CSF.2015.18

V. Cortier and B. Smyth, Attacking and fixing helios: An analysis of ballot secrecy, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.297-311, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00732899

V. Cortier, D. Galindo, S. Glondu, and M. Izabachène, Election Verifiability for Helios under Weaker Trust Assumptions, Proc. 19th European Symposium on Research in Computer Security (ES- ORICS'14), Part II, pp.327-344, 2014.
DOI : 10.1007/978-3-319-11212-1_19

URL : https://hal.archives-ouvertes.fr/hal-01080292

J. Camenisch and M. Stadler, Proof systems for general statements about discrete logarithms, 1997.