PhD student under supervision of Véronique Cortier and Alexandre Debant at Inria Nancy in the Pesto team.
My research focuses on provably secure Internet Voting, with a heightened interest in the Swiss setting. For symbolic proofs, I use ProVerif.
I obtained my Bachelor's and Master's at ETH Zürich. Besides a researcher, I am an experienced full-stack software developer and build applications for the University of Zürich and many others.
florian [dot] moser [at] inria [dot] fr
The German Federal Office for Information Security published a study on end-to-end verifiable online voting mechanisms. We aim to make this study more visible to the E-Vote-ID community (which includes academia, regulatory bodies and vendors). The study describes the core idea of the selected mechanisms and evaluates them using an interdisciplinary approach that considers secrecy, end-to-end verifiability, usability, and practicality. We find that the selection of mechanisms represents the state of the art in internet voting systems well, and that the evaluation clearly showcases the fundamental properties of each mechanism. However, we note that the evaluations are conducted on a per-mechanism basis, whereas real-world systems are composed of multiple [download]. with Veronique Cortier, Alexandre Debant, Ralf Küsters, Johannes Müller & Melanie Volkamer
As digitalization advances, online elections are becoming increasingly prevalent. State-of-the-art internet voting systems implement verifiability, which allows to observe the election result to be correct, while safeguarding the secrecy of the election. However, the continued use of unverifiable 'black-box' systems suggests that election organizers may be unaware of the security challenges in internet voting and the mitigation strategies that have been developed. To address this gap, we developed an informative video on the topic for election organizers who are non-experts in internet voting. To ensure that the simplifications made for our target audience do not lead to misunderstandings, 19 German-speaking internet voting experts evaluated the video. Based on their feedback, we consider improvements to the video to enhance its correctness, clarity, and completeness. Further, developing the video and then performing the expert evaluation provided valuable experiences and lessons learned we want to share with similar endeavours trying to simplify complex topics for non-expert audiences [download]. with Tobias Hilt, Philipp Matheis & Melanie Volkamer
The Swiss Chancellery has developed highly demanding requirements in terms of security for electronic voting. A few protocols have been proposed that meet the requirements. We propose a very simple protocol that satisfies the Swiss requirements while achieving an additional property: secrecy against a dishonest voting device, thanks to code voting. One key feature of our protocol is to use very short codes (typically one or two digits), so that it can be easily used by voters. Moreover, it only relies on standard primitives. Using the tool ProVerif, we formally prove vote privacy and end-to-end verifiability under the trust model of the Swiss Chancellery, assuming a dishonest voting device [download, preprint]. with Véronique Cortier & Alexandre Debant
End-to-end verifiable systems are employed to safeguard the integrity of Internet voting. Voter-initiated verification for individual verifiability require that the ballot formed on the voter’s device is audited on a second device, which is independent of a potentially manipulated voter’s device. Further trust is gained by executing the verification procedure on a second device with independent implementations, in order to defend against a dishonest primary system operator. This paper formulates recommendations to implement such independent individual verifiability tools. Our recommendations are based on the experiences made in the GI elections 2023 where such independent tools were made available to the voters – to our knowledge the first project of its kind [download]. with Rüdiger Grimm, Tobias Hilt, Michael Kirsten, Christoph Niederbudde & Melanie Volkamer
Increasing demands for internet voting instigated the deployment of a multitude of systems used in practice. Within this work, we are interested in which security mechanisms are currently used by vendors to implement verifiable and secret elections. We perform a systematic market study and review academic literature, where out of 82 candidate systems, we find 29 internet voting systems that are both in active use and claim to employ some form of verifiability. Thereof, we characterize and systematize the 18 systems that provide sufficient information to extract their security mechanisms relevant for state-of-the-art verifiability and secrecy. Overall, we find that only eight systems are well-documented, of which only a few employ state-of-the-art mechanisms in all categories that we consider [download]. with Michael Kirsten & Felix Dörre
The study describes and evaluates mechanisms used in verifiable internet voting. It concludes that when evaluating a voting system and its trust assumptions, the system must be evaluated as a whole. Further, according to the current state of the art it is practical to implement verifiable and secrecy-preserving tallying, coupled with a verification of the voter's device. Lastly, it documents that research already identified approaches to preserve secrecy during the verifiable tallying procedure against quantum adversaries [download]. with Johannes Müller, Véronique Cortier, Alexandre Debant, Pierrick Gaudry, Anselme Goetschmann, Ralf Küsters und Melanie Volkamer.
The Master's thesis examines internet voting in Switzerland. First, an overview of the scientific literature is given, and then relevant events, laws and political influences in Switzerland are summarised. To improve the current situation, a code-voting system is proposed that drastically reduces the complexity of the cryptography involved, while achieving stronger security properties. It is proven that this design meets formal definitions of legal requirements [download]. supervised by Kenny Paterson
CHVote is an internet voting protocol suitable for use in Switzerland. As part of the casting procedure, voters authenticate their vote by entering an authentication key. In an effort to increase usability, a novel pairing-based identification protocol was proposed which requires only half the key for the same security guarantee than the previous proposal. The analysis proves the protocol secure, but asserts that the key size cannot be halved [paper]. supervised by Julia Kastner, Dennis Hofheinz
As a group of four students, we investigate whether existing implementations of the widely used Curve25519 could be further improved. Multiple approaches out of existing literature are combined and extended. The resulting implementation for the Intel Skylake architecture is 10% faster (in 2020) than all other implementations of the Bernstein comparison [download, code]. with Philippe Goetschmann, Fabio Streun, Lukas Tobler
We investigate whether passively observable network traffic of netflix can be used to identify the currently watched content. Existing approaches are replicated, and extended. The resulting implementation needs only to measure the in-average used bandwidth to identify what content is being watched [download, code]. supervised by Melissa Licciardello, Ankit Singla
As part of TheAlternative, I used to organize and give lectures [project management, web, pdf]. As a course instructor for University of Zürich, I regularly gave courses about git and GitLab [git].
scientific CV
more about me on famoser.ch