References of "Haines, Thomas"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailScalable Coercion-Resistant E-Voting under Weaker Trust Assumptions
Haines, Thomas; Mueller, Johannes UL; Querejeta-Azurmendi, Inigo

in Proceedings of ACM SAC Conference (SAC'23) (2023)

Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed ... [more ▼]

Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions. [less ▲]

Detailed reference viewed: 48 (2 UL)
Full Text
Peer Reviewed
See detailSoK: Secure E-Voting with Everlasting Privacy
Haines, Thomas; Mueller, Johannes UL; Mosaheb, Rafieh UL et al

in Proceedings on Privacy Enhancing Technologies (PoPETs) (2023)

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting ... [more ▼]

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting) protocols have been proposed to address this challenge, striving for everlasting privacy. This property guarantees that even computationally unbounded adversaries cannot break privacy of past elections. The broad interest in secure e-voting with everlasting privacy has spawned a large variety of protocols over the last three decades. These protocols differ in many aspects, in particular the precise security properties they aim for, the threat scenarios they consider, and the privacy-preserving techniques they employ. Unfortunately, these differences are often opaque, making analysis and comparison cumbersome. In order to overcome this non-transparent state of affairs, we systematically analyze all e-voting protocols designed to provide everlasting privacy. First, we illustrate the relations and dependencies between all these different protocols. Next, we analyze in depth which protocols do provide secure and efficient approaches to e-voting with everlasting privacy under realistic assumptions, and which ones do not. Eventually, based on our extensive and detailed treatment, we identify which research problems in this field have already been solved, and which ones are still open. Altogether, our work offers a well-founded reference point for conducting research on secure e-voting with everlasting privacy as well as for future-proofing privacy in real-world electronic elections. [less ▲]

Detailed reference viewed: 257 (25 UL)
Full Text
Peer Reviewed
See detailVerifiable Decryption in the Head
Gjosteen, Kristian; Haines, Thomas; Mueller, Johannes UL et al

in ACISP 2022 (2022)

In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an ... [more ▼]

In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple verifiable decryption scheme for lattice-based cryptography, especially for large sets of ciphertexts; it has small size and lightweight computations as we reduce the need of zero-knowledge proofs for each ciphertext. We believe the flexibility of the general technique is interesting and provides attractive trade-offs between complexity and security, in particular for the interactive variant with smaller soundness. Finally, the protocol requires only very simple operations, making it easy to correctly and securely implement in practice. We suggest concrete parameters for our protocol and give a proof of concept implementation, showing that it is highly practical. [less ▲]

Detailed reference viewed: 47 (2 UL)
Full Text
Peer Reviewed
See detailA Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Haines, Thomas; Mueller, Johannes UL

in Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (2021)

Detailed reference viewed: 61 (1 UL)
Full Text
Peer Reviewed
See detailEpoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Boyen, Xavier; Haines, Thomas; Mueller, Johannes UL

in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 (2021)

Detailed reference viewed: 56 (3 UL)
Full Text
Peer Reviewed
See detailOptimal Randomized Partial Checking for Decryption Mix Nets
Haines, Thomas; Mueller, Johannes UL

in Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (2021)

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailVote Selling Resistant Voting
Boyd, Colin; Haines, Thomas; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

Detailed reference viewed: 109 (5 UL)
Full Text
Peer Reviewed
See detailRevisiting Practical and Usable Coercion-Resistant Remote E-Voting
Estaji, Ehsan UL; Haines, Thomas; Gjoesteen, Kristian et al

in Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (2020)

Detailed reference viewed: 161 (14 UL)
Full Text
Peer Reviewed
See detailShort Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
Haines, Thomas; Pereira, Olivier; Roenne, Peter UL

in Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia February 14, 2020, Revised Selected Papers (2020)

Detailed reference viewed: 170 (2 UL)
Full Text
Peer Reviewed
See detailA Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Boyen, Xavier; Haines, Thomas; Mueller, Johannes UL

in Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (2020)

Detailed reference viewed: 77 (6 UL)