In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols - namely, the schemes by Sako & Kilian and Schoenmakers - that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.
@techreport{2011-attacking-ballot-secrecy-in-electronic-voting, author = "Ben Smyth and V\'{e}ronique Cortier", title = "{A note on replay attacks that violate privacy in electronic voting schemes}", year = "2011", number = "RR-7643", institution = "INRIA", }