Skip to main content

Showing 1–9 of 9 results for author: Roenne, P B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13240  [pdf, ps, other

    cs.CR cs.HC

    Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)

    Authors: Marie-Laure Zollinger, Peter B. Rønne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga

    Abstract: Voting protocols seek to provide integrity and vote privacy in elections. To achieve integrity, procedures have been proposed allowing voters to verify their vote - however this impacts both the user experience and privacy. Especially, vote verification can lead to vote-buying or coercion, if an attacker can obtain documentation, i.e. a receipt, of the cast vote. Thus, some voting protocols go fur… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2105.14901  [pdf, other

    cs.HC

    User Experience Design for E-Voting: How mental models align with security mechanisms

    Authors: Marie-Laure Zollinger, Verena Distler, Peter B. Roenne, Peter Y. A. Ryan, Carine Lallemand, Vincent Koenig

    Abstract: This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. R… ▽ More

    Submitted 15 June, 2021; v1 submitted 31 May, 2021; originally announced May 2021.

    Comments: E-Vote-ID 2019 TalTech Proceedings

    Journal ref: Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019, p187--202

  3. arXiv:2105.14783  [pdf, other

    cs.CR

    Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability

    Authors: Peter B. Roenne, Peter Y. A Ryan, Marie-Laure Zollinger

    Abstract: Selene is an e-voting protocol that allows voters to directly check their individual vote, in cleartext, in the final tally via a tracker system, while providing good coercion mitigation. This is in contrast to conventional, end-to-end verifiable schemes in which the voter verifies the presence of an encryption of her vote on the bulletin board. The Selene mechanism can be applied to many e-voting… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: E-Vote-ID 2018 TUT Proceedings

  4. arXiv:2011.07887  [pdf, ps, other

    cs.CY cs.MA

    A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips

    Authors: Wojciech Jamroga, David Mestel, Peter B. Roenne, Peter Y. A. Ryan, Marjan Skrobot

    Abstract: The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies for the epidemic, based on social, political, and technological instruments. We postulate that one should {identify the relevant requirements} before committing to a particular mitigation strategy. One way to achieve it is through an overview of what is co… ▽ More

    Submitted 18 October, 2023; v1 submitted 16 November, 2020; originally announced November 2020.

  5. arXiv:2007.09085  [pdf, other

    cs.CR q-bio.QM

    Preservation of DNA Privacy During the Large Scale Detection of COVID-19

    Authors: Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav

    Abstract: As humanity struggles to contain the global COVID-19 pandemic, privacy concerns are emerging regarding confinement, tracing and testing. The scientific debate concerning privacy of the COVID-19 tracing efforts has been intense, especially focusing on the choice between centralised and decentralised tracing apps. The privacy concerns regarding COVID-19 testing, however, have not received as much at… ▽ More

    Submitted 1 August, 2020; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: 10 pages, 1 figure

  6. arXiv:1908.04947  [pdf, ps, other

    cs.CR cs.CY stat.AP

    Risk-Limiting Tallies

    Authors: Wojciech Jamroga, Peter B. Roenne, Peter Y. A. Ryan, Philip B. Stark

    Abstract: Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one candidate then all vote privacy evaporates. The mere possibility of candidates getting no or few votes could have implications for security in pract… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  7. arXiv:1901.02560  [pdf, ps, other

    cs.CR cs.CC cs.DS quant-ph

    Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme

    Authors: Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan

    Abstract: We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The exhaustive, comparison-based approach of JCJ using p… ▽ More

    Submitted 5 February, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 9 pages; added acknowledgments, revised the first paragraph in the section on security remarks, revised a few sentences throughout; to appear in the proceedings of Financial Cryptography and Data Security 2019, published by Springer

  8. arXiv:1812.02245  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

    Authors: Arash Atashpendar, G. Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan

    Abstract: We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from unclon… ▽ More

    Submitted 5 December, 2018; originally announced December 2018.

    Comments: 16 pages, published in the proceedings of NordSec 2018

    Journal ref: NordSec 2018. Lecture Notes in Computer Science, vol. 11252, pp 104-120, Springer, Cham (2018)

  9. arXiv:1610.06343  [pdf, ps, other

    cs.CR

    (Universal) Unconditional Verifiability in E-Voting without Trusted Parties

    Authors: Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan

    Abstract: In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes the tally. Some protocols replace the trusted authority by a set of authorities, and privacy is guaranteed if less than a threshold number of authorities are corrupt. For verifiability, stronger security guarantees are demanded. Typically, corrupt authorities that try to fake the… ▽ More

    Submitted 20 October, 2016; originally announced October 2016.