A note on replay attacks that violate privacy in electronic voting schemes

Ben Smyth 1, * Véronique Cortier 1
* Corresponding author
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols -- namely, the schemes by Sako & Kilian and Schoenmakers -- that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.
Document type :
Reports
Complete list of metadatas

Cited literature [27 references]  Display  Hide  Download

https://hal.inria.fr/inria-00599182
Contributor : Véronique Cortier <>
Submitted on : Wednesday, June 8, 2011 - 5:22:19 PM
Last modification on : Friday, July 6, 2018 - 3:06:10 PM
Long-term archiving on : Friday, November 9, 2012 - 2:52:10 PM

File

RR-7643.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : inria-00599182, version 1

Citation

Ben Smyth, Véronique Cortier. A note on replay attacks that violate privacy in electronic voting schemes. [Research Report] RR-7643, INRIA. 2011. ⟨inria-00599182⟩

Share

Metrics

Record views

292

Files downloads

237