Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Theoretical aspects of voting protocols

2013/09/D/ST6/03927

Keywords:

voting protocols electronic elections cryptographic protocols privacy coercion deniability dispute resolution

Descriptors:

  • ST6_5: Cryptography, security, privacy, quantum computing
  • ST6_4: Formal methods, foundations of computer science, including theoretical computer science, quantum algorithms

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Politechnika Wrocławska, Wydział Podstawowych Problemów Techniki

woj. dolnośląskie

Other projects carried out by the institution 

Principal investigator (from the host institution):

dr Filip Zagórski 

Number of co-investigators in the project: 3

Call: SONATA 5 - announced on 2013-03-15

Amount awarded: 270 080 PLN

Project start date (Y-m-d): 2014-02-20

Project end date (Y-m-d): 2016-09-19

Project duration:: 31 months (the same as in the proposal)

Project status: Project settled

Equipment purchased [PL]

  1. Laptop (8 000 PLN)

Information in the final report

  • Publication in academic press/journals (2)
  • Articles in post-conference publications (9)
  • Book publications / chapters in book publications (1)
  1. Deniable two-party key establishment protocol resistant against extended KCI (eKCI) attacks
    Authors:
    Łukasz Krzywiecki, Tomasz Wlisłocki
    Academic press:
    Security and Communication Networks (rok: 2017, tom: Volume 2017, strony: 45304), Wydawca: Hindawi
    Status:
    Published
    DOI:
    10.1155/2017/7810352 - link to the publication
  2. Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
    Authors:
    Łukasz Krzywiecki, Adam Bobowski, Patryk Kozieł, Marcin Słowik, Marta Wszoła
    Academic press:
    Computer Networks (tom: -, strony: -), Wydawca: Elsevier
    Status:
    Submitted
  1. Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
    Authors:
    Dawid Gaweł, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagórski
    Conference:
    12th International Joint Conference on Electronic Voting E-Vote-ID 2016 (rok: 2017, ), Wydawca: Springer
    Data:
    konferencja 18-21 październik
    Status:
    Published
  2. Hierarchical Ring Signatures Revisited–Unconditionally and Perfectly Anonymous Schnorr Version
    Authors:
    Łukasz Krzywiecki, Małgorzata Sulkowska, Filip Zagórski
    Conference:
    Security, Privacy, and Applied Cryptography Engineering (rok: 2015, ), Wydawca: Springer International Publishing
    Data:
    konferencja 3-7 X 2015
    Status:
    Published
  3. A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections
    Authors:
    Sarah Morin, Grant McClearn, Neal McBurnett, Poorvi L Vora, Filip Zagorski
    Conference:
    Financial Cryptography and Data Security. FC 2020; 5th Workshop on Advances in Secure Electronic Voting (rok: 2020, ), Wydawca: Springer
    Data:
    konferencja 14 lutego
    Status:
    Accepted for publication
  4. Stealing elections with k-cut sampling
    Authors:
    Krzysztof Majcher, Filip Zagórski
    Conference:
    Fifth International Joint Conference on Electronic Voting E-Vote-ID 2020 (rok: 2020, ), Wydawca: Springer
    Data:
    konferencja 6-9 października
    Status:
    Submitted
  5. ATHENA -- round-by-round risk-limiting audit
    Authors:
    Poorvi L. Vora, Filip Zagorski
    Conference:
    ACM Conference on Computer and Communications Security (ACM CCS) (rok: 2020, ), Wydawca: ACM
    Data:
    konferencja 9-13 listopada
    Status:
    Submitted
  6. Efficient Probabilistic Methods for Proof of Possession in Clouds
    Authors:
    Łukasz Krzywiecki, Krzysztof Majcher, Wojciech Macyna
    Conference:
    Data Mining and Big Data (rok: 2016, ), Wydawca: Springer Publishing International
    Data:
    konferencja 25-30 czerwca
    Status:
    Published
  7. PrivApollo– Secret Ballot E2E-V Internet Voting
    Authors:
    Poorvi L. Vora, Hua Wu, Filip Zagórski
    Conference:
    Financial Cryptography and Data Security. FC 2019; 4th Workshop on Advances in Secure Electronic Voting (rok: 2019, ), Wydawca: Springer
    Data:
    konferencja 22 lutego
    Status:
    Published
  8. Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
    Authors:
    Łukasz Krzywiecki
    Conference:
    9th International Conference, SECITC 2016 (rok: 2016, ), Wydawca: Springer International Publishing
    Data:
    konferencja 9-10 czerwca
    Status:
    Published
  9. Privacy preserving ballot generation for code-voting schemes
    Authors:
    Moti Yung, Filip Zagórski
    Conference:
    European Symposium on Research in Computer Security ESORICS (rok: 2020, ), Wydawca: Springer
    Data:
    konferencja 14-18 września
    Status:
    Submitted
  1. The Scantegrity Voting System and its Use in the Takoma Park Elections
    Authors:
    Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora, John Wittrock, Filip Zagórski
    Book:
    Real-world Electronic Voting: Design, Analysis and Deployment (rok: 2016, tom: I, strony: 237-277), Wydawca: CRC Press. Taylor & Francis Group
    Status:
    Published