Subtopic Deep Dive
Secure Electronic Voting Protocols
Research Guide
What is Secure Electronic Voting Protocols?
Secure Electronic Voting Protocols are cryptographic protocols designed for verifiable electronic voting systems that resist coercion, vote-buying, and traffic analysis using techniques like homomorphic encryption and zero-knowledge proofs.
These protocols ensure ballot secrecy, verifiability, and receipt-freeness in remote e-voting. Key works include blockchain-based designs (Hjalmarsson et al., 2018; 422 citations) and analyses of systems like Estonia's (Springall et al., 2014; 243 citations). Over 20 papers from 2000-2021 address protocol security, with foundational privacy methods (Kissner and Song, 2005; 644 citations).
Why It Matters
Secure e-voting protocols enable scalable democratic elections without physical polling, as shown in blockchain implementations reducing fraud risks (Hjalmarsson et al., 2018; Jafar et al., 2021). They counter real-world vulnerabilities like those in Estonia's system, where vote manipulation was demonstrated (Springall et al., 2014). Adoption impacts national elections, with protocols integrating AI for threat detection (Berman et al., 2019).
Key Research Challenges
Coercion and Receipt-Freeness
Voters must prove votes without receipts to prevent vote-buying. Early protocols failed under coercion models (Kremer and Ryan, 2005). Blockchain designs struggle with verifiable unlinkability (Jafar et al., 2021).
Traffic Analysis Resistance
Network patterns reveal voter choices in remote voting. Estonian I-voting exposed timing attacks (Springall et al., 2014). Privacy sets help but scale poorly (Kissner and Song, 2005).
Scalability with Verifiability
Homomorphic encryption verifies tallies without decryption but demands high computation. Blind signatures provide partial solutions (Abe and Okamoto, 2000). Blockchain e-voting faces throughput limits (Hjalmarsson et al., 2018).
Essential Papers
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miller, Jeremy Clark et al. · 2015 · 1.2K citations
Bit coin has emerged as the most successful cryptographic currency in history. Within two years of its quiet launch in 2009, Bit coin grew to comprise billions of dollars of economic value despite ...
Privacy-Preserving Set Operations
Lea Kissner, Dawn Song · 2005 · Lecture notes in computer science · 644 citations
A Survey of Deep Learning Methods for Cyber Security
Daniel S. Berman, Anna L. Buczak, Jeffrey S. Chavis et al. · 2019 · Information · 524 citations
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoe...
A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan et al. · 2020 · IEEE Access · 477 citations
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged cyberattacks. Cyber security techni...
Blockchain-Based E-Voting System
Friorik P. Hjalmarsson, Gunnlaugur K. Hreioarsson, Mohammad Hamdaqa et al. · 2018 · 422 citations
Building a secure electronic voting system that offers the fairness and privacy of current voting schemes, while providing the transparency and flexibility offered by electronic systems has been a ...
A Conceptual Secure Blockchain Based Electronic Voting System
Ahmed Ben Ayed · 2017 · International Journal of Network Security & Its Applications · 313 citations
Blockchain is offering new opportunities to develop new types of digital services.While research on the topic is still emerging, it has mostly focused on the technical and legal issues instead of t...
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity
Sherali Zeadally, Erwin Adi, Zubair Baig et al. · 2020 · IEEE Access · 298 citations
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforc...
Reading Guide
Foundational Papers
Start with Kissner and Song (2005) for privacy sets foundational to receipt-freeness; Springall et al. (2014) for real-world I-voting flaws; Kremer and Ryan (2005) for formal protocol analysis.
Recent Advances
Hjalmarsson et al. (2018) for blockchain e-voting; Jafar et al. (2021) for open challenges; Ben Ayed (2017) for conceptual designs.
Core Methods
Homomorphic encryption for tallying, zero-knowledge proofs for verifiability, blind signatures for anonymity (Abe and Okamoto, 2000), blockchain ledgers (Hjalmarsson et al., 2018).
How PapersFlow Helps You Research Secure Electronic Voting Protocols
Discover & Search
Research Agent uses searchPapers and citationGraph to map 250+ papers from Hjalmarsson et al. (2018), tracing blockchain e-voting lineages; exaSearch uncovers traffic analysis gaps via 'receipt-freeness protocols'; findSimilarPapers links Kissner and Song (2005) to modern zero-knowledge applications.
Analyze & Verify
Analysis Agent employs readPaperContent on Springall et al. (2014) to extract Estonian vulnerabilities, verifyResponse with CoVe checks protocol claims against Kremer and Ryan (2005), and runPythonAnalysis simulates vote tally statistics with NumPy for homomorphic schemes; GRADE scores evidence strength in Jafar et al. (2021) reviews.
Synthesize & Write
Synthesis Agent detects gaps in coercion resistance across Hjalmarsson et al. (2018) and Abe and Okamoto (2000); Writing Agent uses latexEditText for protocol pseudocode, latexSyncCitations for 20+ refs, latexCompile for full reports, and exportMermaid diagrams election flows.
Use Cases
"Simulate homomorphic encryption tally in Kissner and Song (2005) for 10k votes."
Research Agent → searchPapers → Analysis Agent → readPaperContent + runPythonAnalysis (NumPy/pandas for vote aggregation stats, matplotlib plots) → verifiable tally output with error rates.
"Write LaTeX critique of Estonia I-voting flaws from Springall et al."
Research Agent → citationGraph → Synthesis Agent → gap detection → Writing Agent → latexEditText + latexSyncCitations + latexCompile → peer-review ready PDF with diagrams.
"Find GitHub repos implementing Ben Ayed (2017) blockchain voting."
Research Agent → paperExtractUrls → Code Discovery → paperFindGithubRepo + githubRepoInspect → code snippets, security audits, and deployment scripts.
Automated Workflows
Deep Research workflow conducts systematic reviews of 50+ e-voting papers: searchPapers → citationGraph → DeepScan (7-step verification on Springall et al., 2014). Theorizer generates new coercion-resistant protocol theories from Kissner and Song (2005) + Jafar et al. (2021). DeepScan applies CoVe chain to validate Hjalmarsson et al. (2018) claims against traffic analysis.
Frequently Asked Questions
What defines Secure Electronic Voting Protocols?
Cryptographic designs for verifiable e-voting resistant to coercion using homomorphic encryption and zero-knowledge proofs, as in Hjalmarsson et al. (2018).
What are core methods in these protocols?
Blockchain for transparency (Ben Ayed, 2017), privacy-preserving sets (Kissner and Song, 2005), and blind signatures (Abe and Okamoto, 2000).
What are key papers?
Foundational: Kissner and Song (2005; 644 citations), Springall et al. (2014; 243 citations); Recent: Hjalmarsson et al. (2018; 422 citations), Jafar et al. (2021; 250 citations).
What open problems exist?
Scalable traffic analysis resistance and coercion-proof verifiability, per Jafar et al. (2021) and Springall et al. (2014).
Research Internet Traffic Analysis and Secure E-voting with AI
PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:
AI Literature Review
Automate paper discovery and synthesis across 474M+ papers
Code & Data Discovery
Find datasets, code repositories, and computational tools
Deep Research Reports
Multi-source evidence synthesis with counter-evidence
AI Academic Writing
Write research papers with AI assistance and LaTeX support
See how researchers in Computer Science & AI use PapersFlow
Field-specific workflows, example queries, and use cases.
Start Researching Secure Electronic Voting Protocols with AI
Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.
See how PapersFlow works for Computer Science researchers