E-Voting and Identity

Volume 4896 of the series Lecture Notes in Computer Science pp 137-149

Simulation-Based Analysis of E2E Voting Systems

  • Olivier de MarneffeAffiliated withCrypto Group – Université catholique de Louvain
  • , Olivier PereiraAffiliated withCrypto Group – Université catholique de Louvain
  • , Jean-Jacques QuisquaterAffiliated withCrypto Group – Université catholique de Louvain

* Final gross prices may vary according to local VAT.

Get Access


End-to-end auditable voting systems are expected to guarantee very interesting, and often sophisticated security properties, including correctness, privacy, fairness, receipt-freeness, ... However, for many well-known protocols, these properties have never been analyzed in a systematic way. In this paper, we investigate the use of techniques from the simulation-based security tradition for the analysis of these protocols, through a case-study on the ThreeBallot protocol.

Our analysis shows that the ThreeBallot protocol fails to emulate some natural voting functionality, reflecting the lack of election fairness guarantee from this protocol. Guided by the reasons that make our security proof fail, we propose a simple variant of the ThreeBallot protocol and show that this variant emulates our functionality.