2021 IEEE 34th Computer Security Foundations Symposium (CSF) 2021
DOI: 10.1109/csf51468.2021.00016
|View full text |Cite
|
Sign up to set email alerts
|

Fixing the Achilles Heel of E-Voting: The Bulletin Board

Abstract: The results of electronic elections should be verifiable so that all cheating is detected. To support this, many protocols employ an electronic bulletin board (BB) for publishing data that can be read by participants and used to perform verifiability checks. We demonstrate that the BB is itself a security-critical component that has often been treated far too casually in previous designs and analyses. In particular, we present novel attacks on the e-voting protocols Belenios, Civitas, and Helios that violate s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 46 publications
0
15
0
Order By: Relevance
“…8 However, as we recall next, this claim is not correct. Hirschi, Schmid, and Basin [37] demonstrate that PBB in Belenios needs to be trusted for verifiability (and to a limited degree for privacy). Moreover, Baloglu, Bursuc, Mauw, and Pang [3] present different attacks against verifiability of Belenios if EA or PBB, but not necessarily both of them, are corrupted.…”
Section: Conceptmentioning
confidence: 99%
“…8 However, as we recall next, this claim is not correct. Hirschi, Schmid, and Basin [37] demonstrate that PBB in Belenios needs to be trusted for verifiability (and to a limited degree for privacy). Moreover, Baloglu, Bursuc, Mauw, and Pang [3] present different attacks against verifiability of Belenios if EA or PBB, but not necessarily both of them, are corrupted.…”
Section: Conceptmentioning
confidence: 99%
“…(*) Note Helios and the Estonian system could be easily adapted to complex ballots if they adopted a mixnet instead of homomorphic tallying. from the bulletin board once they are published, and every participant's final view of the WBB is identical [18,33] . In practice this means that we need the voter to have access to the WBB via a channel independent from the Client Device.…”
Section: Cryptographic Backgroundmentioning
confidence: 99%
“…Guaranteeing privacy in the face of such active adversaries is a common standard which (most) modern e-voting systems aim to provide. However, it turned out that numerous e-voting systems fall short of this goal in their respective threat scenarios, including seminal systems like Helios (see [7,10,18]), Civitas (see [24,27]), or Prêt à Voter (see [10]).…”
Section: Introductionmentioning
confidence: 99%
“…One of the most prominent classes of attacks against privacy-if not the most prominent one-are replay attacks (see, e.g., [7,13,18,19,24]) to which many e-voting systems have been proven vulnerable (e.g., [1,8,16,34,36,37]). Roughly speaking, a replay attack works as follows.…”
Section: Introductionmentioning
confidence: 99%