# Bibliography for paper-based E2E schemes ###### tags: `bibliography` # Main Papers ## [Secret-ballot receipts: True voter-verifiable elections (IEEE S&P magazine, 2004)](https://people.csail.mit.edu/rivest/voting/papers/Chaum-SecretBallotReceiptsTrueVoterVerifiableElections.pdf) * David Chaum ## [A Practical Voter-Verifiable Election Scheme (EOSRICS 2005)](http://www.computing.surrey.ac.uk/personal/st/S.Schneider/papers/esorics05.pdf) * David Chaum, Peter Y.A. Ryan, and Steve Schneider * Introduced a variant of Pret a Voter. In the earlier version (Ryan, WITS'05) the voter was invited to choose which of the leeft and right columns to retain. * In the new version: 1) ballot forms are generated and printed in advance. 2) the voter always discards thhe left hand column. 3) uses the tellers in **an oracle mode** to enable the checks on the well-formedness of the ballot form. * There is a base ordering, and the candidate list is encoded as the number of cyclic shifts. So for four candidates, there are four possible values. * All tellers must be involved to perform the decryption. * Input to each teller: $(r_i, D_i)$ * Single candidate election -> multi-candidate * "The idea of providing the voteer with an encrypted rreceipt oes back to the original scheme proposed by Chaum." * In the book chapter, referred to as "the original version of Pret a Voter". ## [Prêt à voter with re-encryption mixes (ESORICS 2006)](https://link.springer.com/chapter/10.1007/11863908_20) * Peter Y A Ryan and Steve Schneider * Modifies [CRS05]: 1) distributed construction of ballots; 2) on-deemand decryption and printing of of the ballot form; 3) use ree-encryption mixes * Discusses **chain voting** attack ## [Human Readable Paper Verification of Prêt à Voter (ESORICS 2008)](https://link.springer.com/chapter/10.1007/978-3-540-88313-5_25) * David Lundin & Peter Y. A. Ryan * Added VVPAT to PAV ## [The Prêt à Voter Verifiable Election System (TIFS 2009)](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=5272310&casa_token=I87RPLLOTEsAAAAA:X066z0IMVmpnyLrWW1z-D-Q8o07eXywZWvws3UvKX-E6comSrIg1xcfBXPomKCtr1nUQ_9Q&tag=1) * Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia * Uses re-encryption mix-nets ## [vVote: A verifiable voting system (ACM TISSEC 2015)](https://dl.acm.org/doi/pdf/10.1145/2746338?casa_token=2xTyPfzzJbwAAAAA:qWqjzsAX47uGduBa7mU1Q3vVnaoZd7sD5WVf7kIJclm5LQVg48-hL4yqcCjvzTgk6KFjI7VDp6s) * Chris Culnane, Peter Y A Ryan, Steve Schneider, and Vanessa Teague. * "The system ran successfully in the state election in Victoria (Australia) in November 2014, taking a total of 1121 votes from supervised polling places inside Victoria and at the Australian High Commission in London." * Printed ballots on-demand * Used mix-net based on re-encryption * Used Randomized Partial Checking with modifications proposed by Khazaei and Wikstrom (2013) trash attack, clash attack, Italian attack # Secondary papers ## [A verifiable secret shuffle and its application to e-voting (CCS 2001)](https://dl.acm.org/doi/pdf/10.1145/501983.502000?casa_token=Qn-ThkWHrpAAAAAA:l44WRpnF5ewjNM9mQ3q1L9NV7MetaH8LQwZDAbBT00pzHMNqjF9JB07MO8tZln4vkeRjA0TsYTk) * Andrew Neff * Proposed Neff's voting protocol ## [Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking (USENIX SECURITY 2002)](https://www.usenix.org/legacy/events/sec02/full_papers/jakobsson/jakobsson.pdf) * Markus Jakobsson, Ari Juels, Ronald Rivest * Proposed *randomized partial checkng* (RPC) for mix-net without using zero-knowledge proofs. ## [A better ballot box? (IEEE Spectrum, 2002)](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1038569&casa_token=GeX5_4qYEK4AAAAA:n1YCIAeenFi8APri8FprmxVg3JXc2tD-AxEuemwkdYwFBVwpBCXNEva7GuqxtsexwFCVvnU&tag=1) * Rebecca Mercuri * Desscribes tthe Mercuri method ## [A Varient of the Chaum voter-verifiable Scheme (WITS 2005)](https://dl.acm.org/doi/pdf/10.1145/1045405.1045414?casa_token=EbypZ0eDIJkAAAAA:psaJHZSjWENNLo3-Cy_O82YGkwYr1RaaGCUt2O7dWOgmqmDQ9FCPKUOZIfIpvFg0BfCPb8-6VPU) * Peter Ryan * An early version of Pret a Voter * It is based on an earlier version published in a 2004 TR by Bryan and Ryan, which replaces the visual cryptography in Chaum's 2004 scheme with a pair of aligned paper strips * It's later replaced by the ESORICS 2005 version