Home > Research > Publications & Outputs > Distributed, end-to-end verifiable, and privacy...

Electronic data

  • DDEMOS

    Rights statement: This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 83, 2019 DOI: 10.1016/j.cose.2019.03.001

    Accepted author manuscript, 1.8 MB, PDF document

    Available under license: CC BY-NC-ND

Links

Text available via DOI:

View graph of relations

Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. / Chondros, N.; Zhang, B.; Zacharias, T. et al.
In: Computers and Security, Vol. 83, 01.06.2019, p. 268-299.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Chondros, N, Zhang, B, Zacharias, T, Diamantopoulos, P, Maneas, S, Patsonakis, C, Delis, A, Kiayias, A & Roussopoulos, M 2019, 'Distributed, end-to-end verifiable, and privacy-preserving internet voting systems', Computers and Security, vol. 83, pp. 268-299. https://doi.org/10.1016/j.cose.2019.03.001

APA

Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A., & Roussopoulos, M. (2019). Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. Computers and Security, 83, 268-299. https://doi.org/10.1016/j.cose.2019.03.001

Vancouver

Chondros N, Zhang B, Zacharias T, Diamantopoulos P, Maneas S, Patsonakis C et al. Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. Computers and Security. 2019 Jun 1;83:268-299. Epub 2019 Mar 6. doi: 10.1016/j.cose.2019.03.001

Author

Chondros, N. ; Zhang, B. ; Zacharias, T. et al. / Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. In: Computers and Security. 2019 ; Vol. 83. pp. 268-299.

Bibtex

@article{8d43a9ae3d114a4ab2e80f2c67854dcf,
title = "Distributed, end-to-end verifiable, and privacy-preserving internet voting systems",
abstract = "We present the D-DEMOS suite of distributed, privacy-preserving, and end-to-end verifiable e-voting systems; one completely asynchronous and one with minimal timing assumptions but better performance. Their distributed voting operation is human verifiable; a voter can vote over the web, using an unsafe web client stack, without sacrificing her privacy, and get recorded-as-cast assurance. Additionally, a voter can outsource election auditing to third parties, still without sacrificing privacy. We provide a model and security analysis of the systems, implement prototypes of the complete systems, measure their performance experimentally, demonstrate their ability to handle large-scale elections, and demonstrate the performance trade-offs between the two versions.",
keywords = "E-voting systems, Internet voting, End-to-end verifiability, Distributed systems, Byzantine Fault tolerance",
author = "N. Chondros and B. Zhang and T. Zacharias and P. Diamantopoulos and S. Maneas and C. Patsonakis and A. Delis and A. Kiayias and M. Roussopoulos",
note = "This is the author{\textquoteright}s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 83, 2019 DOI: 10.1016/j.cose.2019.03.001",
year = "2019",
month = jun,
day = "1",
doi = "10.1016/j.cose.2019.03.001",
language = "English",
volume = "83",
pages = "268--299",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Ltd",

}

RIS

TY - JOUR

T1 - Distributed, end-to-end verifiable, and privacy-preserving internet voting systems

AU - Chondros, N.

AU - Zhang, B.

AU - Zacharias, T.

AU - Diamantopoulos, P.

AU - Maneas, S.

AU - Patsonakis, C.

AU - Delis, A.

AU - Kiayias, A.

AU - Roussopoulos, M.

N1 - This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 83, 2019 DOI: 10.1016/j.cose.2019.03.001

PY - 2019/6/1

Y1 - 2019/6/1

N2 - We present the D-DEMOS suite of distributed, privacy-preserving, and end-to-end verifiable e-voting systems; one completely asynchronous and one with minimal timing assumptions but better performance. Their distributed voting operation is human verifiable; a voter can vote over the web, using an unsafe web client stack, without sacrificing her privacy, and get recorded-as-cast assurance. Additionally, a voter can outsource election auditing to third parties, still without sacrificing privacy. We provide a model and security analysis of the systems, implement prototypes of the complete systems, measure their performance experimentally, demonstrate their ability to handle large-scale elections, and demonstrate the performance trade-offs between the two versions.

AB - We present the D-DEMOS suite of distributed, privacy-preserving, and end-to-end verifiable e-voting systems; one completely asynchronous and one with minimal timing assumptions but better performance. Their distributed voting operation is human verifiable; a voter can vote over the web, using an unsafe web client stack, without sacrificing her privacy, and get recorded-as-cast assurance. Additionally, a voter can outsource election auditing to third parties, still without sacrificing privacy. We provide a model and security analysis of the systems, implement prototypes of the complete systems, measure their performance experimentally, demonstrate their ability to handle large-scale elections, and demonstrate the performance trade-offs between the two versions.

KW - E-voting systems

KW - Internet voting

KW - End-to-end verifiability

KW - Distributed systems

KW - Byzantine Fault tolerance

U2 - 10.1016/j.cose.2019.03.001

DO - 10.1016/j.cose.2019.03.001

M3 - Journal article

VL - 83

SP - 268

EP - 299

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

ER -