3rd Workshop on Advances in Secure Electronic Voting

Voting

In Assocation with Financial Cryptography 2018
March 2, 2018
Santa Barbara Beach Resort
Curaçao

Call For Papers

Elections form the foundations of democracy and have been the target for attack since its inception. Over the last few decades the introduction of digital technologies to elections has opened up a raft of new attack vectors. Recently in the US there is discussion of placing voting technologies on the list of national, critical infrastructures. Secure voting protocols, in particular so-called “end-to-end verifiable” schemes, have been a hot topic of research for the last decade or so. Voting poses many challenges: the precise characterization of very subtle properties including verifiability and coercion resistance, and the design and analysis of schemes providing these properties in a complex, hostile environment. The field requires a deep understanding of modern crypto but is highly interdisciplinary, requiring understanding of the role of humans, procedures, laws, regulations, etc.

Papers should contain original research in any area related to electronic voting technologies, verifiable elections, and related concerns. Example topics include but are not limited to:

  • In-person voting systems
  • Remote/Internet voting systems
  • Voter registration and authentication systems
  • Procedures for ballot and election auditing
  • Cryptographic (or non-cryptographic) verifiable election schemes
  • Attacks on existing systems
  • Designs of new systems
  • Experiences deploying voting systems or conducting elections
  • Experiences detecting and recovering from election problems
  • Formal or informal security or requirements analysis
  • Examination of usability and accessibility issues
  • Research on relevant regulations, standards, or laws
  • Attacks and defences on systems for voter registration
  • Manipulation of public opinion through media, social networks and fake news

Important Dates

Submissions deadlineNov 4, 23:59 UTC (*)
Notification of acceptanceDec 17

(*) Note: The submission deadline will be extended to Nov 11 to give everyone an extra week. If you are the sort of person who regards last-minute extensions as a nice bonus, please disregard this note. If you optimize your life with precision and consider last-minute extensions an annoying disturbance, you can assume that the real hard deadline is Nov 11.

Submission

Submissions will be judged on originality, relevance, correctness, and clarity.

Experience reports or case studies are welcome, as long as they contain sufficient scientific rigour and original analysis to constitute scientific research.

Submissions must not substantially overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions must follow the Springer Lecture Notes in Computer Science format and should be no more than 15 pages including references and well-marked appendices. Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science.

All submissions will be reviewed double-blind, and as such, must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.

Submission website: https://easychair.org/conferences/?conf=voting18

Program Chairs

Vanessa TeagueUniversity of Melbourne
Jeremy ClarkConcordia University

Program Committee

To be announced

This conference is organized annually by the International Financial Cryptography Association in cooperation with IACR.