2022 IEEE 35th Computer Security Foundations Symposium (CSF) 2022
DOI: 10.1109/csf54842.2022.9979167
|View full text |Cite
|
Sign up to set email alerts
|

How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis

Abstract: Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real practical elections.Despite their popularity, it is commonly believed that replay attacks are inefficient but the actual threat that they pose to vote privacy has never been studied formally. Therefore, in this paper, we precisely analyze for the first time how efficient replay attacks really are.We study this questio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Tallying phase. The tallier T takes all submitted ballots as input, removes possible duplicates (to protect against replay attacks [42] that violate vote privacy) and all ballots with invalid proofs, and extracts the ciphertexts (𝑒 𝑖 ) 𝑖 of the remaining ballots.…”
Section: Basic Secure E-votingmentioning
confidence: 99%
“…Tallying phase. The tallier T takes all submitted ballots as input, removes possible duplicates (to protect against replay attacks [42] that violate vote privacy) and all ballots with invalid proofs, and extracts the ciphertexts (𝑒 𝑖 ) 𝑖 of the remaining ballots.…”
Section: Basic Secure E-votingmentioning
confidence: 99%
“…This is, for instance, the case when voters can choose between many different candidates or when voters can rank candidates (e.g., in instant-runoff voting). On the contrary, in B-ID-MIX, voters only need to prove knowledge of their secret votes in order to ensure that they created their ballots independently; this measure protects, in particular, against replay attacks that violate vote privacy[54]. The NIZKPs employed for this purpose are typically independent of the number of choices.…”
mentioning
confidence: 99%
“…We presented the first four contributions in the conference paper[37], whereas our fifth contribution (efficiency analysis of replay attacks under the assumption of approximate prior knowledge) is novel.…”
mentioning
confidence: 99%