Ben Smyth
Aida Manzano Kharman
Ben Smyth
Freddie Page
Is your vote truly secret? Ballot Secrecy iff Ballot Independence: Proving necessary conditions and analysing case studies.
2023
abs/2311.12977
CoRR
https://doi.org/10.48550/arXiv.2311.12977
db/journals/corr/corr2311.html#abs-2311-12977
Ben Smyth
Michael R. Clarkson
Surveying definitions of election verifiability.
106267
2022
177
Inf. Process. Lett.
https://doi.org/10.1016/j.ipl.2022.106267
db/journals/ipl/ipl177.html#SmythC22
Ben Smyth
Michael R. Clarkson
Surveying definitions of election verifiability.
305
2022
2022
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2022/305
db/journals/iacr/iacr2022.html#SmythC22
Ben Smyth
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios.
551-611
2021
29
J. Comput. Secur.
6
https://doi.org/10.3233/JCS-191415
https://www.wikidata.org/entity/Q114944650
db/journals/jcs/jcs29.html#Smyth21
Peter B. Rønne
Peter Y. A. Ryan
Ben Smyth
Cast-as-Intended: A Formal Definition and Case Studies.
251-262
2021
Financial Cryptography Workshops
https://doi.org/10.1007/978-3-662-63958-0_22
conf/fc/2021w
db/conf/fc/fc2021w.html#RonneRS21
Ben Smyth
Surveying global verifiability.
106000
2020
163
Inf. Process. Lett.
https://doi.org/10.1016/j.ipl.2020.106000
db/journals/ipl/ipl163.html#Smyth20
Ben Smyth
Surveying global verifiability.
849
2020
2020
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2020/849
db/journals/iacr/iacr2020.html#Smyth20
Ben Smyth
Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems.
1054
2020
2020
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2020/1054
db/journals/iacr/iacr2020.html#Smyth20a
Ben Smyth
Yoshikazu Hanatani
Non-malleable encryption with proofs of plaintext knowledge and applications to voting.
191-204
2019
14
Int. J. Secur. Networks
4
https://doi.org/10.1504/IJSN.2019.103150
https://www.wikidata.org/entity/Q113741572
db/journals/ijsn/ijsn14.html#SmythH19
Maxime Meyer
Ben Smyth
Exploiting re-voting in the Helios election system.
14-19
2019
143
Inf. Process. Lett.
https://doi.org/10.1016/j.ipl.2018.11.001
db/journals/ipl/ipl143.html#MeyerS19
Ashley Fraser
Elizabeth A. Quaglia
Ben Smyth
A Critique of Game-Based Definitions of Receipt-Freeness for Voting.
189-205
2019
ProvSec
https://doi.org/10.1007/978-3-030-31919-9_11
conf/provsec/2019
db/conf/provsec/provsec2019.html#FraserQS19
Ben Smyth
TLS 1.3 for engineers: An exploration of the TLS 1.3 specification and Oracle's Java implementation.
2019
abs/1904.02148
CoRR
http://arxiv.org/abs/1904.02148
db/journals/corr/corr1904.html#abs-1904-02148
Maxime Meyer
Elizabeth A. Quaglia
Ben Smyth
An Overview of GSMA's M2M Remote Provisioning Specification.
2019
abs/1906.02254
CoRR
http://arxiv.org/abs/1906.02254
db/journals/corr/corr1906.html#abs-1906-02254
Ben Smyth
Yoshikazu Hanatani
Non-malleable encryption with proofs of plaintext knowledge and applications to voting.
26
2019
2019
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2019/026
db/journals/iacr/iacr2019.html#SmythH19
Ben Smyth
Athena: A verifiable, coercion-resistant voting system with linear complexity.
761
2019
2019
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2019/761
db/journals/iacr/iacr2019.html#Smyth19
Ben Smyth
Surveying definitions of coercion resistance.
822
2019
2019
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2019/822
db/journals/iacr/iacr2019.html#Smyth19a
Ashley Fraser
Elizabeth A. Quaglia
Ben Smyth
A critique of game-based definitions of receipt-freeness for voting.
853
2019
2019
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2019/853
db/journals/iacr/iacr2019.html#FraserQS19
Bruno Blanchet
Ben Smyth
Automated reasoning for equivalences in the applied pi calculus with barriers.
367-422
2018
26
J. Comput. Secur.
3
https://doi.org/10.3233/JCS-171013
https://www.wikidata.org/entity/Q114944761
db/journals/jcs/jcs26.html#BlanchetS18
Elizabeth A. Quaglia
Ben Smyth
Secret, verifiable auctions from elections.
44-92
2018
730
Theor. Comput. Sci.
https://doi.org/10.1016/j.tcs.2018.03.022
db/journals/tcs/tcs730.html#QuagliaS18
Elizabeth A. Quaglia
Ben Smyth
Authentication with Weaker Trust Assumptions for Voting Systems.
322-343
2018
AFRICACRYPT
https://doi.org/10.1007/978-3-319-89339-6_18
conf/africacrypt/2018
db/conf/africacrypt/africacrypt2018.html#QuagliaS18
Maxime Meyer
Elizabeth A. Quaglia
Ben Smyth
Attacks Against GSMA's M2M Remote Provisioning (Short Paper).
243-252
2018
Financial Cryptography
https://doi.org/10.1007/978-3-662-58387-6_13
conf/fc/2018
db/conf/fc/fc2018.html#MeyerQS18
Ben Smyth
Verifiability of Helios Mixnet.
247-261
2018
Financial Cryptography Workshops
https://doi.org/10.1007/978-3-662-58820-8_17
conf/fc/2018w
db/conf/fc/fc2018w.html#Smyth18
Tom Chothia
Joeri de Ruiter
Ben Smyth
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.
1563-1580
2018
USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity18/presentation/chothia
conf/uss/2018
db/conf/uss/uss2018.html#ChothiaRS18
Ben Smyth
Verifiability of Helios Mixnet.
17
2018
2018
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2018/017
db/journals/iacr/iacr2018.html#Smyth18
Elizabeth A. Quaglia
Ben Smyth
Authentication with weaker trust assumptions for voting systems.
222
2018
2018
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2018/222
db/journals/iacr/iacr2018.html#QuagliaS18
Ben Smyth
A foundation for secret, verifiable elections.
225
2018
2018
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2018/225
db/journals/iacr/iacr2018.html#Smyth18a
Jeremie Leguay
Georgios S. Paschos
Elizabeth A. Quaglia
Ben Smyth
CryptoCache: Network caching with confidentiality.
1-6
2017
ICC
https://doi.org/10.1109/ICC.2017.7996866
conf/icc/2017
db/conf/icc/icc2017.html#LeguayPQS17
Elizabeth A. Quaglia
Ben Smyth
A short introduction to secrecy and verifiability for elections.
2017
abs/1702.03168
CoRR
http://arxiv.org/abs/1702.03168
db/journals/corr/corr1702.html#QuagliaS17
Bruno Blanchet
Ben Smyth
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers.
310-324
2016
CSF
https://doi.org/10.1109/CSF.2016.29
https://doi.ieeecomputersociety.org/10.1109/CSF.2016.29
conf/csfw/2016
db/conf/csfw/csf2016.html#BlanchetS16
Maxime Meyer
Ben Smyth
An attack against the Helios election system that violates eligibility.
2016
abs/1612.04099
CoRR
http://arxiv.org/abs/1612.04099
db/journals/corr/corr1612.html#MeyerS16
David Bernhard
Véronique Cortier
Olivier Pereira
Ben Smyth
Bogdan Warinschi
Adapting Helios for provable ballot privacy.
756
2016
2016
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2016/756
db/journals/iacr/iacr2016.html#BernhardCPSW16
Ben Smyth
Mark Dermot Ryan
Liqun Chen 0002
Formal analysis of privacy in Direct Anonymous Attestation schemes.
300-317
2015
111
Sci. Comput. Program.
https://doi.org/10.1016/j.scico.2015.04.004
db/journals/scp/scp111.html#SmythRC15
Ben Smyth
Yoshikazu Hanatani
Hirofumi Muratani
NM-CPA Secure Encryption with Proofs of Plaintext Knowledge.
115-134
2015
IWSEC
https://doi.org/10.1007/978-3-319-22425-1_8
conf/iwsec/2015
db/conf/iwsec/iwsec2015.html#SmythHM15
Tom Chothia
Ben Smyth
Christopher Staite
Automatically Checking Commitment Protocols in ProVerif without False Attacks.
137-155
2015
POST
https://doi.org/10.1007/978-3-662-46666-7_8
conf/post/2015
db/conf/post/post2015.html#ChothiaSS15
Ben Smyth
Steven Frink
Michael R. Clarkson
Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ.
233
2015
2015
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2015/233
db/journals/iacr/iacr2015.html#SmythFC15
Ben Smyth
Secrecy and independence for election schemes.
942
2015
2015
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2015/942
db/journals/iacr/iacr2015.html#Smyth15
Elizabeth A. Quaglia
Ben Smyth
Constructing secret, verifiable auction schemes from election schemes.
1204
2015
2015
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2015/1204
db/journals/iacr/iacr2015.html#QuagliaS15
Adam McCarthy
Ben Smyth
Elizabeth A. Quaglia
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes.
51-63
2014
Financial Cryptography
https://doi.org/10.1007/978-3-662-45472-5_4
conf/fc/2014
db/conf/fc/fc2014.html#McCarthySQ14
Ben Smyth
Ballot secrecy with malicious bulletin boards.
822
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/822
db/journals/iacr/iacr2014.html#Smyth14
Véronique Cortier
Ben Smyth
Attacking and fixing Helios: An analysis of ballot secrecy.
89-148
2013
21
J. Comput. Secur.
1
https://doi.org/10.3233/JCS-2012-0458
db/journals/jcs/jcs21.html#CortierS13
Ben Smyth
David Bernhard
Ballot Secrecy and Ballot Independence Coincide.
463-480
2013
ESORICS
https://doi.org/10.1007/978-3-642-40203-6_26
conf/esorics/2013
db/conf/esorics/esorics2013.html#SmythB13
Ben Smyth
Alfredo Pironti 0001
Truncating TLS Connections to Violate Beliefs in Web Applications.
2013
WOOT
https://www.usenix.org/conference/woot13/workshop-program/presentation/smyth
conf/woot/2013
db/conf/woot/woot2013.html#SmythP13
Ben Smyth
David Bernhard
Ballot secrecy and ballot independence coincide.
235
2013
2013
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2013/235
db/journals/iacr/iacr2013.html#SmythB13
Dalia Khader
Ben Smyth
Peter Y. A. Ryan
Feng Hao 0001
A Fair and Robust Voting System by Broadcast.
285-299
2012
Electronic Voting
conf/ev/2012
db/conf/ev/ev2012.html#KhaderSRH12
https://dl.gi.de/handle/20.500.12116/18220
http://subs.emis.de/LNI/Proceedings/Proceedings205/article6745.html
Fangming Zhao
Yoshikazu Hanatani
Yuichi Komano
Ben Smyth
Satoshi Ito
Toru Kambayashi
Secure authenticated key exchange with revocation for smart grid.
1-8
2012
ISGT
https://doi.org/10.1109/ISGT.2012.6175530
https://www.wikidata.org/entity/Q62043388
conf/isgt/2012
db/conf/isgt/isgt2012.html#ZhaoHKSIK12
Mark Dermot Ryan
Ben Smyth
Guilin Wang
Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings
7232
2012
Springer
Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-642-29101-2
978-3-642-29100-5
ISPEC
db/conf/ispec/ispec2012.html
Ben Smyth
Replay attacks that violate ballot secrecy in Helios.
185
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/185
db/journals/iacr/iacr2012.html#Smyth12
Ben Smyth
Mark Dermot Ryan
Liqun Chen 0002
Formal analysis of privacy in Direct Anonymous Attestation schemes.
650
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/650
db/journals/iacr/iacr2012.html#SmythRC12
Ben Smyth
Formal verification of cryptographic protocols with automated reasoning.
2011
University of Birmingham, UK
http://etheses.bham.ac.uk/1604/
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535277
British Library, EThOS
Véronique Cortier
Ben Smyth
Attacking and Fixing Helios: An Analysis of Ballot Secrecy.
297-311
2011
CSF
https://doi.org/10.1109/CSF.2011.27
https://doi.ieeecomputersociety.org/10.1109/CSF.2011.27
conf/csfw/2011
db/conf/csfw/csf2011.html#CortierS11
David Bernhard
Véronique Cortier
Olivier Pereira
Ben Smyth
Bogdan Warinschi
Adapting Helios for Provable Ballot Privacy.
335-354
2011
ESORICS
https://doi.org/10.1007/978-3-642-23822-2_19
conf/esorics/2011
db/conf/esorics/esorics2011.html#BernhardCPSW11
Ben Smyth
Mark Ryan 0001
Liqun Chen 0002
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes.
245-262
2011
Formal Aspects in Security and Trust
https://doi.org/10.1007/978-3-642-29420-4_16
conf/ifip1-7/2011
db/conf/ifip1-7/fast2011.html#SmythRC11
Mark Dermot Ryan
Ben Smyth
Applied pi calculus.
112-142
2011
Formal Models and Techniques for Analyzing Security Protocols
https://doi.org/10.3233/978-1-60750-714-7-112
books/ios/11/CK2011
db/books/collections/CK2011.html#RyanS11
Steve Kremer
Mark Ryan 0001
Ben Smyth
Election Verifiability in Electronic Voting Protocols.
389-404
2010
ESORICS
https://doi.org/10.1007/978-3-642-15497-3_24
https://www.wikidata.org/entity/Q60530315
conf/esorics/2010
db/conf/esorics/esorics2010.html#KremerRS10
Ben Smyth
Mark Ryan 0001
Steve Kremer
Mounira Kourjieh
Towards Automatic Analysis of Election Verifiability Properties.
146-163
2010
ARSPA-WITS
https://doi.org/10.1007/978-3-642-16074-5_11
conf/ifip1-7/2010wits
db/conf/ifip1-7/wits2010.html#SmythRKK10
Véronique Cortier
Ben Smyth
Attacking and fixing Helios: An analysis of ballot secrecy.
625
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/625
db/journals/iacr/iacr2010.html#CortierS10
Stéphanie Delaune
Mark Ryan 0001
Ben Smyth
Automatic Verification of Privacy Properties in the Applied pi Calculus.
263-278
2008
IFIPTM
https://doi.org/10.1007/978-0-387-09428-1_17
https://www.wikidata.org/entity/Q60530319
conf/ifiptm/2008
db/conf/ifiptm/ifiptm2008.html#DelauneRS08
Ben Smyth
Mark Ryan 0001
Liqun Chen 0002
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.
218-231
2007
conf/esas/2007
ESAS
https://doi.org/10.1007/978-3-540-73275-4_16
db/conf/esas/esas2007.html#SmythRC07
David Bernhard
Bruno Blanchet
Liqun Chen 0002
Tom Chothia
Michael R. Clarkson
Véronique Cortier
Stéphanie Delaune
Ashley Fraser
Steven Frink
Yoshikazu Hanatani
Feng Hao 0001
Satoshi Ito
Toru Kambayashi
Dalia Khader
Aida Manzano Kharman
Yuichi Komano
Mounira Kourjieh
Steve Kremer
Jeremie Leguay
Adam McCarthy
Maxime Meyer
Hirofumi Muratani
Freddie Page
Georgios S. Paschos
Olivier Pereira
Alfredo Pironti 0001
Elizabeth A. Quaglia
Peter B. Rønne
Joeri de Ruiter
Mark Ryan 0001Mark Dermot Ryan
Peter Y. A. Ryan
Christopher Staite
Guilin Wang
Bogdan Warinschi
Fangming Zhao