User Tools

Site Tools


Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations (BibTeX)

@inproceedings{KuestersMueller-EVOTEID-2017,
  author      = {Ralf K{\"u}sters and Johannes M{\"u}ller},
  title       = {{Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations}},
  booktitle   = {Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings },
  year        = 2017,
  editor      = {Robert Krimmer and Melanie Volkamer and Nadja Braun Binder and Norbert Kersting and Olivier Pereira and Carsten Sch{\"{u}}rmann},
  volume      = 10615,
  series      = {Lecture Notes in Computer Science},
  pages       = {21-41},
  publisher   = {Springer},
  note        = {Invited paper},
  abstract    = {Rigorous cryptographic security analysis plays an important role in the design of modern e-voting systems by now. There has been huge progress in this field in the last decade or so in terms of formalizing security requirements and formally analyzing e-voting systems. This paper summarizes some of the achievements and lessons learned, which, among others, challenge common believes about the role of and the relationships between central security requirements.},
}