A note on replay attacks that violate privacy in electronic voting schemes

Ben Smyth & Véronique Cortier (2011) A note on replay attacks that violate privacy in electronic voting schemes. INRIA Technical Report RR-7643.

Download

Abstract

In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols - namely, the schemes by Sako & Kilian and Schoenmakers - that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.

Bibtex Entry

@techreport{2011-attacking-ballot-secrecy-in-electronic-voting,
	author = "Ben Smyth and V\'{e}ronique Cortier",
	title = "{A note on replay attacks that violate privacy in electronic voting schemes}",
	year = "2011",
	number = "RR-7643",
	institution = "INRIA",
}