In our previous work, we have shown that the Helios 2.0 electronic voting protocol does not satisfy ballot independence and exploit this weakness to violate privacy; in particular, the Helios scheme is shown to be vulnerable to a replay attack. In this note we examine two further electronic voting protocols - namely, the schemes by Sako & Kilian and Schoenmakers - that are known not to satisfy ballot independence and demonstrate replay attacks that violate privacy.
@techreport{2011-attacking-ballot-secrecy-in-electronic-voting,
author = "Ben Smyth and V\'{e}ronique Cortier",
title = "{A note on replay attacks that violate privacy in electronic voting schemes}",
year = "2011",
number = "RR-7643",
institution = "INRIA",
}