User menu

Clash attacks and the STAR-Vote system

Bibliographic reference Pereira, Olivier ; Wallach, Dan S.. Clash attacks and the STAR-Vote system.Electronic Voting - Second International Joint Conference, E-Vote-ID (Bregenz (Austria), du 24/10/2017 au 27/10/2017). In: Robert Krimmer, Melanie Volkamer, Nadja Braun Bindre, Norbert Kersting, Olivier Pereira, Cartsen Schürmann, Proceesings of Electronic Voting - Second International Joint Conference, E-Vote-ID, Springer : Heidelberg2017, p. 228-247
Permanent URL http://hdl.handle.net/2078.1/192372
  1. Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: EVT/WOTE 2009, Montreal, August 2009
  2. Bell, S., Benaloh, J., Byrne, M., DeBeauvoir, D., Eakin, B., Fischer, G., Kortum, P., McBurnett, N., Montoya, J., Parker, M., Pereira, O., Stark, P., Wallach, D., Winn, M.: STAR-Vote: a secure, transparent, auditable, and reliable voting system. USENIX JETS 1, 18–37 (2013)
  3. Ben-Nun, J., Farhi, N., Llewellyn, M., Riva, B., Rosen, A., Ta-Shma, A., Wikström, D.: A new implementation of a dual (paper and cryptographic) voting system. In: EVOTE 2012, July 2012
  4. Benaloh, J., Jones, D., Lazarus, E., Lindeman, M., Stark, P.: SOBA: secrecy-preserving observable ballot-level audits. In: EVT/WOTE 2011. USENIX (2011)
  5. Benaloh, J.: Simple verifiable elections. In: EVT 2006, Vancouver, B.C., June 2006
  6. Benaloh, J.: Ballot casting assurance via voter-initiated poll station auditing. In: EVT 2007, Boston, MA, August 2007
  7. Bishop, M.: UC Red Team Report of California Secretary of State Top-to-Bottom Voting Systems Review, July 2007
  8. da Cruz, F.: IBM card sorters. Columbia University Computing History. http://www.columbia.edu/cu/computinghistory/sorter.html
  9. Cuvelier Édouard, Pereira Olivier, Peters Thomas, Election Verifiability or Ballot Privacy: Do We Need to Choose?, Lecture Notes in Computer Science (2013) ISBN:9783642402029 p.481-498, 10.1007/978-3-642-40203-6_27
  10. DasGupta Anirban, The matching, birthday and the strong birthday problem: a contemporary review, 10.1016/j.jspi.2003.11.015
  11. Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: 11th USENIX Security Symposium (2002)
  12. Küsters, R., Truderung, T., Vogt, A.: Clash attacks on the verifiability of e-voting systems. In: IEEE Symposium on Security and Privacy (2012)
  13. Pereira, O., Rivest, R.: Marked mix-nets. In: Workshop on Advances in Secure Electronic Voting - Voting 2017 (2017)
  14. Project EVEREST (Evaluation, Validation of Election-Related Equipment, Standards, Testing): Risk Assessment Study of Ohio Voting Systems. http://www.sos.state.oh.us/sos/info/everest.aspx
  15. Rivest, R.L., Smith, W.D.: Three voting protocols: ThreeBallot, VAV, and Twin. In: EVT 2007, Boston, MA, August 2007
  16. Travis County Purchasing Office: STAR-Vote: Request for Information for a New Voting System. http://traviscountyclerk.org/eclerk/content/images/pdf_STARVote_2015.06.03_RFI.pdf
  17. Wikström Douglas, A Commitment-Consistent Proof of a Shuffle, Information Security and Privacy (2009) ISBN:9783642026195 p.407-421, 10.1007/978-3-642-02620-1_28