Cryptographic security analysis of E-voting systems: Achievements, misconceptions, and limitations

7Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Rigorous cryptographic security analysis plays an important role in the design of modern e-voting systems by now. There has been huge progress in this field in the last decade or so in terms of formalizing security requirements and formally analyzing e-voting systems. This paper summarizes some of the achievements and lessons learned, which, among others, challenge common believes about the role of and the relationships between central security requirements.

Cite

CITATION STYLE

APA

Küsters, R., & Müller, J. (2017). Cryptographic security analysis of E-voting systems: Achievements, misconceptions, and limitations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10615 LNCS, pp. 21–41). Springer Verlag. https://doi.org/10.1007/978-3-319-68687-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free