Stefan Röhrich

Learn More
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulation abound. Voting schemes have to fulfill seemingly contradictory requirements: On one hand the election process should be verifiable to prevent electoral fraud and on the other(More)
Given a signature sfor some message malong with a corresponding public verification key yin a key substitution attack an attacker derives another verification key $$\overline{y}$$ ≠ y—possibly along with a matching secret key—such that sis also a valid signature of mfor the verification key $$\overline{y}$$ . Menezes and Smart have shown that with suitable(More)
The main purpose of cryptographic voting schemes is to provide transparency while protecting ballot secrecy and to enable a fast tally. In this paper, we address three major issues of cryptographic voting schemes. First we discuss the problem of secrecy and coercion resistance in the situation of a corrupted voting machine. While hard to obtain in general,(More)
  • 1