, Belenios -Verifiable online voting system

, Exigences techniques et administratives applicables au vote électronique. Chancellerie fédérale ChF, 2014.

B. Adida, Helios: Web-based open-audit voting, 17th USENIX Security Symposium (Usenix'08), pp.335-348, 2008.

B. Adida, O. Olivier-de-marneffe, J. Pereira, and . Quisquater, Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios, Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. Usenix, vol.8, 2009.

M. Arapinis, V. Cortier, and S. Kremer, When are three voters enough for privacy properties?, 21st European Symposium on Research in Computer Security (Esorics'16), vol.9879, pp.241-260, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01351398

G. Barthe, F. Dupressoir, B. Grégoire, C. Kunz, B. Schmidt et al., EasyCrypt: A tutorial, Foundations of Security Analysis and Design (FOSAD'13), pp.146-166, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01114366

S. Bell, J. Benaloh, M. D. Byrne, D. Debeauvoir, B. Eakin et al., STAR-Vote: A secure, transparent, auditable, and reliable voting system, Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE'13), 2013.

M. Bellare and P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, ACM-CCS'93, 1993.

J. Benaloh, Simple verifiable elections, USENIX Security Symposium (EVT'06), 2006.

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, A comprehensive analysis of game-based ballot privacy definitions, 36th IEEE Symposium on Security and Privacy (S&P'15), pp.499-516, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01206289

D. Bernhard, O. Pereira, and B. Warinschi, How not to prove yourself: Pitfalls of the Fiat-Shamir heuristic and applications to Helios, Advances in Cryptology -ASIACRYPT 2012, vol.7658, pp.626-643, 2012.

B. Blanchet, Automatic verification of security protocols in the symbolic model: The verifier ProVerif, Foundations of Security Analysis and Design (FOSAD'13), vol.8604, pp.54-87, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01102136

O. Blazy, G. Fuchsbauer, D. Pointcheval, and D. Vergnaud, Signatures on randomizable ciphertexts, Public Key Cryptography -PKC 2011, pp.403-422, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00542643

P. Chaidos, V. Cortier, G. Fuchsbauer, and D. Galindo, BeleniosRF: A non-interactive receipt-free electronic voting scheme, 23rd ACM Conference on Computer and Communications Security (CCS'16), pp.1614-1625, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01377917

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a secure voting system, IEEE Symposium on Security and Privacy (S&P'08), pp.354-368, 2008.

V. Cortier, P. Constantin-catalin-dragan, F. Strub, B. Dupressoir, and . Warinschi, Machine-checked proofs for electronic voting: privacy and verifiability for Belenios, 31st IEEE Computer Security Foundations Symposium (CSF'18), pp.298-312, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01900081

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Distributed ElGamal à la Pedersen -application to Helios, Workshop on Privacy in the Electronic Society (WPES 2013), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00881076

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Election verifiability for Helios under weaker trust assumptions, 19th European Symposium on Research in Computer Security (ESORICS'14), vol.8713, pp.327-344, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, SoK: Verifiability notions for e-voting protocols, 36th IEEE Symposium on Security and Privacy (S&P'16), pp.779-798, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01280445

V. Cortier and J. Lallemand, Voting: You can't have privacy without individual verifiability, 25th ACM Conference on Computer and Communications Security (CCS'18), pp.53-66, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01900086

V. Cortier and B. Smyth, Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013.
URL : https://hal.archives-ouvertes.fr/inria-00638556

E. Cuvelier, O. Pereira, and T. Peters, Election verifiability or ballot privacy: Do we need to choose?, 18th European Symposium on Research in Computer Security (ESORICS'13), pp.481-498, 2013.

A. Filipiak, Design and formal analysis of security protocols, an application to electronic voting and mobile payment, 2018.
URL : https://hal.archives-ouvertes.fr/tel-01862680

D. Galindo, S. Guasch, and J. Puiggali, Neuchâtel's cast-asintended verification mechanism, 5th International Conference on E-Voting and Identity, pp.3-18, 2015.

P. Gaudry, Some ZK security proofs for Belenios, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01576379

S. Glondu, Belenios specification -version 1, 2018.

R. Haenni, R. E. Koenig, P. Locher, and E. Dubuis, CHVote system specification. Cryptology ePrint Archive, 2017.

J. , A. Halderman, and V. Teague, The New South Wales iVote system: Security failures and verification flaws in a live online election, 5th International Conference on E-voting and Identity (VoteID '15), 2015.

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Workshop on Privacy in the Electronic Society (WPES'05), pp.61-70, 2005.

A. Kiayias, T. Zacharias, and B. Zhang, DEMOS-2: Scalable E2E verifiable elections without random oracles, ACM Conference on Computer and Communications Security (CCS'15), 2015.

R. Küsters, J. Müller, E. Scapin, and T. Truderung, sElect: A lightweight verifiable remote voting system, 29th IEEE Computer Security Foundations Symposium (CSF'16), pp.341-354, 2016.

R. Küsters, T. Truderung, and A. Vogt, Accountabiliy: Definition and relationship to verifiability, 17th ACM Conference on Computer and Communications Security (CCS'10), pp.526-535, 2010.

T. Moran and M. Naor, Receipt-free universally-verifiable voting with everlasting privacy, CRYPTO 2006, vol.4117, pp.373-392, 2006.

T. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, CRYPTO 1991, pp.129-140, 1991.

P. Ryan, Prêt à Voter with Paillier encryption, Mathematical and Computer Modelling, vol.48, issue.9, pp.1646-1662, 2008.

Y. A. Peter, P. B. Ryan, V. Roenne, and . Iovino, Selene: Voting with transparent verifiability and coercion-mitigation, 1st Workshop on Secure Voting Systems (VOTING'16), pp.176-192, 2016.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated analysis of Diffie-Hellman protocols and advanced security properties, 25th IEEE Computer Security Foundations Symposium (CSF'12), pp.78-94, 2012.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security analysis of the Estonian Internet voting system, 11th ACM Conference on Computer and Communications Security (CCS'04), pp.703-715, 2004.

N. Swamy, C. Hritcu, C. Keller, A. Rastogi, A. Delignatlavaud et al., Dependent types and multi-monadic effects in F*, 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'16), pp.256-270, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01265793

S. Wolchok, E. Wustrow, D. Isabel, and J. A. Halderman, Attacking the Washington, D.C. Internet voting system, Financial Cryptography and Data Security (FC'12), 2012.