Skip to Main content Skip to Navigation
Conference papers

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

Abstract : We propose a framework for the analysis of electronic voting schemes in the presence of malicious bulletin boards. We identify a spectrum of notions where the adversary is allowed to tamper with the bulletin board in ways that reflect practical deployment and usage considerations. To clarify the security guarantees provided by the different notions we establish a relation with simulation-based security with respect to a family of ideal functionalities. The ideal functionalities make clear the set of authorised attacker capabilities which makes it easier to understand and compare the associated levels of security. We then leverage this relation to show that each distinct level of ballot privacy entails some distinct form of individual verifiability. As an application, we study three protocols of the literature (Helios, Belenios, and Civitas) and identify the different levels of privacy they offer.
Document type :
Conference papers
Complete list of metadata

Cited literature [27 references]  Display  Hide  Download
Contributor : Véronique Cortier Connect in order to contact the contributor
Submitted on : Friday, October 16, 2020 - 5:02:58 PM
Last modification on : Wednesday, November 3, 2021 - 7:57:20 AM
Long-term archiving on: : Sunday, January 17, 2021 - 11:29:36 PM


Files produced by the author(s)


  • HAL Id : hal-02969613, version 1



Véronique Cortier, Joseph Lallemand, Bogdan Warinschi. Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. CSF 2020 - 33rd IEEE Computer Security Foundations Symposium, Jun 2020, Boston / Virtual, United States. ⟨hal-02969613⟩



Record views


Files downloads