A note on replay attacks that violate privacy in electronic voting schemes
A note on replay attacks that violate privacy in electronic voting schemes. Ben Smyth and Véronique Cortier. Rapport de recherche RR-7643, INRIA, 2011.
Download
Abstract
In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols -- namely, the schemes by Sako & Kilian and Schoenmakers -- that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.
BibTeX
@techreport{SMYTH:2011:INRIA-00599182:1, hal_id = {inria-00599182}, title = {{A note on replay attacks that violate privacy in electronic voting schemes}}, author = {Smyth, Ben and Cortier, V{\'e}ronique}, abstract = {{In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols -- namely, the schemes by Sako \& Kilian and Schoenmakers -- that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.}}, keywords = {Ballot Independence, Ballot Secrecy, Electronic Voting, Privacy, Replay Attack, Vulnerability.}, language = {Anglais}, affiliation = {CASSIS - INRIA Lorraine - LORIA / LIFC}, type = {Rapport de recherche}, institution = {INRIA}, number = {RR-7643}, year = {2011}, month = Jun, }