Results 1-10 of 10.
((uid:50035120))

Bookmark and Share    
Full Text
Peer Reviewed
See detailBreaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV
Mueller, Johannes UL

in Workshop on Advances in Secure Electronic Voting 2022 (2022)

We revisit the e-voting protocol IVXV that is used for legally-binding political elections in Estonia from a privacy perspective. We demonstrate that IVXV is vulnerable to attacks against vote privacy in ... [more ▼]

We revisit the e-voting protocol IVXV that is used for legally-binding political elections in Estonia from a privacy perspective. We demonstrate that IVXV is vulnerable to attacks against vote privacy in those threat scenarios that were considered for IVXV originally. We explain how to improve IVXV so that it protects against the privacy issues we discovered. [less ▲]

Detailed reference viewed: 91 (1 UL)
Full Text
Peer Reviewed
See detailHow Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
Mestel, David UL; Mueller, Johannes UL; Reisert, Pascal

in 35th IEEE Computer Security Foundations Symposium (2022)

Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real ... [more ▼]

Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real practical elections. Despite their popularity, it is commonly believed that replay attacks are inefficient but the actual threat that they pose to vote privacy has never been studied formally. Therefore, in this paper, we precisely analyze for the first time how efficient replay attacks really are. We study this question from commonly used and complementary perspectives on vote privacy, showing as an independent contribution that a simple extension of a popular game-based privacy definition corresponds to a strong entropy-based notion. Our results demonstrate that replay attacks can be devastating for a voter's privacy even when an adversary's resources are very limited. We illustrate our formal findings by applying them to a number of real-world elections, showing that a modest number of replays can result in significant privacy loss. Overall, our work reveals that, contrary to a common belief, replay attacks can be very efficient and must therefore be considered a serious threat. [less ▲]

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailVerifiable Decryption in the Head
Gjosteen, Kristian; Haines, Thomas; Mueller, Johannes UL et al

in ACISP 2022 (2022)

In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an ... [more ▼]

In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple verifiable decryption scheme for lattice-based cryptography, especially for large sets of ciphertexts; it has small size and lightweight computations as we reduce the need of zero-knowledge proofs for each ciphertext. We believe the flexibility of the general technique is interesting and provides attractive trade-offs between complexity and security, in particular for the interactive variant with smaller soundness. Finally, the protocol requires only very simple operations, making it easy to correctly and securely implement in practice. We suggest concrete parameters for our protocol and give a proof of concept implementation, showing that it is highly practical. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailOptimal Randomized Partial Checking for Decryption Mix Nets
Haines, Thomas; Mueller, Johannes UL

in Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (2021)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailA Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Haines, Thomas; Mueller, Johannes UL

in Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (2021)

Detailed reference viewed: 41 (0 UL)
Full Text
Peer Reviewed
See detailEpoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting
Boyen, Xavier; Haines, Thomas; Mueller, Johannes UL

in IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021 (2021)

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailOrdinos: A Verifiable Tally-Hiding E-Voting System
Mueller, Johannes UL

in Küsters, Ralf; Liedtke, Julian; Mueller, Johannes (Eds.) et al IEEE European Symposium on Security and Privacy (2020)

Detailed reference viewed: 46 (1 UL)
Full Text
Peer Reviewed
See detailSoK: Techniques for Verifiable Mix Nets
Mueller, Johannes UL

in Haines, Thomas; Mueller, Johannes (Eds.) IEEE Computer Security Foundations Symposium (2020)

Detailed reference viewed: 55 (5 UL)
Full Text
Peer Reviewed
See detailA Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
Boyen, Xavier; Haines, Thomas; Mueller, Johannes UL

in Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II (2020)

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailPost-Quantum Anonymous Veto Networks
Ding, Jintai; Emery, Doug; Mueller, Johannes UL et al

in E-Vote-ID 2020 (2020)

Detailed reference viewed: 90 (4 UL)