Cast-as-Intended: A Formal Definition and Case Studies

[1]  Ben Smyth Surveying global verifiability , 2020, IACR Cryptol. ePrint Arch..

[2]  Peter Y. A. Ryan,et al.  Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme , 2020, Financial Cryptography Workshops.

[3]  Ben Smyth,et al.  A critique of game-based definitions of receipt-freeness for voting , 2019, IACR Cryptol. ePrint Arch..

[4]  Peter Y. A. Ryan,et al.  Security - Visible, Yet Unseen? , 2019, CHI.

[5]  Damian Kurpiewski,et al.  Model Checking the SELENE E-Voting Protocol in Multi-agent Logics , 2018, E-Vote-ID.

[6]  Vincenzo Iovino,et al.  Using Selene to Verify Your Vote in JCJ , 2017, Financial Cryptography Workshops.

[7]  Ben Smyth,et al.  Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).

[8]  Vanessa Teague,et al.  Strategies for Voter-Initiated Election Audits , 2016, GameSec.

[9]  Vincenzo Iovino,et al.  Selene: Voting with Transparent Verifiability and Coercion-Mitigation , 2016, Financial Cryptography Workshops.

[10]  Aggelos Kiayias,et al.  End-to-End Verifiable Elections in the Standard Model , 2015, EUROCRYPT.

[11]  Ben Smyth,et al.  Ballot Secrecy and Ballot Independence Coincide , 2013, ESORICS.

[12]  Ralf Küsters,et al.  A Game-Based Definition of Coercion-Resistance and Its Applications , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.

[13]  Ralf Küsters,et al.  Accountability: definition and relationship to verifiability , 2010, CCS '10.

[14]  Mark Ryan,et al.  Election Verifiability in Electronic Voting Protocols , 2010, ESORICS.

[15]  Mark Ryan,et al.  Towards Automatic Analysis of Election Verifiability Properties , 2010, ARSPA-WITS.

[16]  Jörn Müller-Quade,et al.  Universally Composable Incoercibility , 2009, IACR Cryptol. ePrint Arch..

[17]  Mark Ryan,et al.  Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..

[18]  Brian Randell,et al.  Voting Technologies and Trust , 2006, IEEE Security & Privacy.

[19]  Moni Naor,et al.  Receipt-Free Universally-Verifiable Voting with Everlasting Privacy , 2006, CRYPTO.

[20]  David Chaum,et al.  A Practical Voter-Verifiable Election Scheme , 2005, ESORICS.

[21]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.