Skip to Main content Skip to Navigation
New interface
Reports (Research report)

A note on replay attacks that violate privacy in electronic voting schemes

Ben Smyth 1, * Véronique Cortier 1 
* Corresponding author
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols -- namely, the schemes by Sako & Kilian and Schoenmakers -- that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.
Document type :
Reports (Research report)
Complete list of metadata

Cited literature [27 references]  Display  Hide  Download
Contributor : Véronique Cortier Connect in order to contact the contributor
Submitted on : Wednesday, June 8, 2011 - 5:22:19 PM
Last modification on : Wednesday, October 26, 2022 - 8:16:47 AM
Long-term archiving on: : Friday, November 9, 2012 - 2:52:10 PM


Files produced by the author(s)


  • HAL Id : inria-00599182, version 1


Ben Smyth, Véronique Cortier. A note on replay attacks that violate privacy in electronic voting schemes. [Research Report] RR-7643, INRIA. 2011. ⟨inria-00599182⟩



Record views


Files downloads