Rigorous cryptographic security analysis plays an important role in the design of modern e-voting systems by now. There has been huge progress in this field in the last decade or so in terms of formalizing security requirements and formally analyzing e-voting systems. This paper summarizes some of the achievements and lessons learned, which, among others, challenge common believes about the role of and the relationships between central security requirements.
CITATION STYLE
Küsters, R., & Müller, J. (2017). Cryptographic security analysis of E-voting systems: Achievements, misconceptions, and limitations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10615 LNCS, pp. 21–41). Springer Verlag. https://doi.org/10.1007/978-3-319-68687-5_2
Mendeley helps you to discover research relevant for your work.