The Append-Only Web Bulletin Board

@inproceedings{Heather2008TheAW,
  title={The Append-Only Web Bulletin Board},
  author={James Heather and David Lundin},
  booktitle={Formal Aspects in Security and Trust},
  year={2008}
}
A large number of papers on verifiable electronic voting that have appeared in the literature in recent years have relied heavily on the availability of an append-only web bulletin board. [...] Key Method We show how such a board can be constructed in order to satisfy the properties we have identified. Finally, we consider how to extend the scheme to make the web bulletin board robust and able to offer assurance to writers of the inclusion of their messages. Although the work presented here has been…Expand
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems
TLDR
This is the first time a peered secure web bulletin board suite of protocols has been formally verified, and it is shown that for n peers, a threshold of t > 2n/3 peers behaving correctly is sufficient to ensure correct behaviour of the bulletin board distributed design. Expand
On Secure Bulletin Boards for E-Voting
Vote collection together with storage of collected votes is the first phase of practically any electronic voting (e-voting) protocol. This functionality is provided by a bulletin board system. ManyExpand
A Generic Interface for the Public Bulletin Board Used in UniVote
  • S. Hauser, R. Haenni
  • Computer Science
  • 2016 Conference for E-Democracy and Open Government (CeDEM)
  • 2016
TLDR
This paper shows based on the protocol of UniVote what these requirements might be and what other problems may arise from an operational and organisational point ofview and proposes a generic interface for the main boardfunctionalities. Expand
Modeling a Bulletin Board Service Based on Broadcast Channels with Memory
TLDR
The model is based on an ideal broadcast channel with memory, which transmits messages without loss of information to a present or future receiver and contributes to a better understanding of these properties and may help in designing future bulletin board implementations. Expand
Evolution of Bulletin Board & its application to E-Voting - A Survey
TLDR
A concise survey of bulletin boards’ evolution with a typical application to the e-voting systems and how several desired security properties are realized through bulletin boards is presented. Expand
Implementing Broadcast Channels with Memory for Electronic Voting Systems
TLDR
A generic interface for the main board functionalities is defined, which offers a flexible way of extending the basic properties of a bulletin board to comply with all sorts of additional requirements. Expand
Fixing the Achilles Heel of E-Voting: The Bulletin Board
TLDR
This work presents novel attacks on the e-voting protocols Belenios, Civitas, and Helios that violate some of their central security claims under realistic system assumptions and proposes a BB protocol that satisfies final-agreement under weak, realistic trust assumptions and provides a machine-checked proof thereof. Expand
On the Security Properties of e-Voting Bulletin Boards
TLDR
This work introduces a framework for the formal security analysis of the BB functionality modeled as a distributed system that treats a secure BB as a robust public transaction ledger, defined by Garay et al, that additionally supports the generation of receipts for successful posting. Expand
A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes
TLDR
A generic approach to prevent board flooding attacks in remote electronic voting schemes providing coercion-resistance is presented, in which the total amount of votes accepted by the public bulletin board is restricted. Expand
Universally verifiable poll-site voting schemes providing everlasting privacy
TLDR
A summary of privacy weaknesses that may arise in verifiable electronic poll-site voting systems is provided, and a new protocol that combines existing approaches but improves them with respect to privacy and efficiency is introduced. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 35 REFERENCES
The ThreeBallot Voting System
We present a new paper-based voting method with interesting security properties. The attempt here is to see if one can achieve the same security properties of recently proposed cryptographic votingExpand
Scratch & vote: self-contained paper-based cryptographic voting
TLDR
Scratch & Vote is presented, a cryptographic voting system designed to minimize cost and complexity that combines the multi-candidate election techniques of Baudron et al. with the ballot-casting simplicity of Chaum and Ryan's paper-based techniques. Expand
Receipt-free secret-ballot elections (extended abstract)
TLDR
This paper presents the first verifiable secret-ballot election protocols in which participants are unable to prove to others how they voted, and describes how this defect is embedded within prior election protocols. Expand
A Secure and Optimally Efficient Multi-Authority Election Scheme
In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the performance isExpand
Practical multi-candidate election system
TLDR
A practical multi-candidate election scheme that guarantees privacy of voters, public verifiability, and robustness against a coalition of malicious authorities is described, based on the Paillier cryptosystem and on some related zero-knowledge proof techniques. Expand
A Verifiable Voting Protocol Based on Farnel
TLDR
A flaw in the ThreeBallot system proposed by Rivest is pointed out: it reveals statistical information about who is winning the election and a new, voter-verifiable version of the Farnel voting system in which voters retain copies of ballot IDs as receipts is presented. Expand
Punchscan: Introduction and System Definition of a High-Integrity Election System
TLDR
This paper defines the Punchscan system and voting protocol, including the people, objects and events involved and the ways they interact, and traces the flow of data throughout the election process. Expand
Providing Receipt-Freeness in Mixnet-Based Voting Protocols
TLDR
This paper proposes a simple and efficient method to incorporate receipt-freeness in mixnet-based electronic voting schemes by using the well known re-encryption technique and designated verifier re- Encryption proof (DVRP). Expand
An Improvement on a Practical Secret Voting Scheme
TLDR
In this scheme voters do not need to join to the counting stage; hence the voters can walk away once they cast their ballots, which will be beneficial in the practical implementation of a voting scheme where less round complexity is desired. Expand
Verifiable e-Voting Indisputable electronic elections at polling places
TLDR
Voter Verification ensures that your voted ballot accurately captures your intent and is contained in the ballot box for counting – your ballot is cast-as-intended. Expand
...
1
2
3
4
...