{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:45:09Z","timestamp":1776084309159,"version":"3.50.1"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,6,9]],"date-time":"2015-06-09T00:00:00Z","timestamp":1433808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fonds National de Recherche (FNR) Luxembourg SeRTVS project"},{"name":"EPSRC Trustworthy Voting Systems project EP\/G025797\/1"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2015,6,9]]},"abstract":"<jats:p>The Pr\u00eat \u00e0 Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this article, we present our development of the Pr\u00eat \u00e0 Voter design to a practical implementation used in a real state election in November 2014, called vVote. As well as solving practical engineering challenges, we have also had to tailor the system to the idiosyncrasies of elections in the Australian state of Victoria and the requirements of the Victorian Electoral Commission. This article includes general background, user experience, and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyze their security properties and explain how they tie in to other design decisions.<\/jats:p>","DOI":"10.1145\/2746338","type":"journal-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T18:26:28Z","timestamp":1434133588000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["vVote"],"prefix":"10.1145","volume":"18","author":[{"given":"Chris","family":"Culnane","sequence":"first","affiliation":[{"name":"University of Surrey, UK"}]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[{"name":"University of Surrey, UK"}]},{"given":"Vanessa","family":"Teague","sequence":"additional","affiliation":[{"name":"University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2015,6,9]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"1","article-title":"STAR-Vote: A secure, transparent, auditable, and reliable voting star-vote: A secure, transparent, auditable, and reliable voting system","volume":"1","author":"Bell Susan","year":"2013","unstructured":"Susan Bell , Josh Benaloh , Michael D. Byrne , Dana DeBeauvoir , Bryce Eakin , Gail Fisher , Philip Kortum , Neal McBurnett , Julian Montoya , Michelle Parker , Olivier Pereira , Philip B. Stark , Dan S. Wallach , and Michael Winn . 2013 . STAR-Vote: A secure, transparent, auditable, and reliable voting star-vote: A secure, transparent, auditable, and reliable voting system . USENIX Journal of Election Technology and Systems (JETS) 1 , 1 (August 2013). Susan Bell, Josh Benaloh, Michael D. Byrne, Dana DeBeauvoir, Bryce Eakin, Gail Fisher, Philip Kortum, Neal McBurnett, Julian Montoya, Michelle Parker, Olivier Pereira, Philip B. Stark, Dan S. Wallach, and Michael Winn. 2013. STAR-Vote: A secure, transparent, auditable, and reliable voting star-vote: A secure, transparent, auditable, and reliable voting system. USENIX Journal of Election Technology and Systems (JETS) 1, 1 (August 2013).","journal-title":"USENIX Journal of Election Technology and Systems (JETS)"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 5th International Conference on Electronic Voting (EVOTE\u201912)","author":"Ben-Nun Jonathan","year":"2012","unstructured":"Jonathan Ben-Nun , Niko Fahri , Morgan Llewellyn , Ben Riva , Alon Rosen , Amnon Ta-Shma , and Douglas Wikstr\u00f6m . 2012 . A new implementation of a dual (paper and cryptographic) voting system . In Proceedings of the 5th International Conference on Electronic Voting (EVOTE\u201912) . Jonathan Ben-Nun, Niko Fahri, Morgan Llewellyn, Ben Riva, Alon Rosen, Amnon Ta-Shma, and Douglas Wikstr\u00f6m. 2012. A new implementation of a dual (paper and cryptographic) voting system. In Proceedings of the 5th International Conference on Electronic Voting (EVOTE\u201912)."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 1st USENIXAccurate Electronic Voting Technology Workshop.","author":"Benaloh Josh","year":"2006","unstructured":"Josh Benaloh . 2006 . Simple verifiable elections . In Proceedings of the 1st USENIXAccurate Electronic Voting Technology Workshop. Josh Benaloh. 2006. Simple verifiable elections. In Proceedings of the 1st USENIXAccurate Electronic Voting Technology Workshop."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033757"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections.","author":"Burton Craig","year":"2012","unstructured":"Craig Burton , Chris Culnane , James Heather , Thea Peacock , Peter Y. A. Ryan , Steve Schneider , Sriramkrishnan Srinivasan , Vanessa Teague , Roland Wen , and Zhe Xia . 2012 b. Using Pr\u00eat \u00e0 Voter in Victorian State elections . In Proceedings of the Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections. Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, and Zhe Xia. 2012b. Using Pr\u00eat \u00e0 Voter in Victorian State elections. In Proceedings of the Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 5th International Conference on Electronic Voting.","author":"Burton Craig","year":"2012","unstructured":"Craig Burton , Chris Culnane , James Heather , Thea Peacock , Peter Y. A. Ryan , Steve Schneider , Sriramkrishnan Srinivasan , and Zhe Xia . 2012 a. A supervised verifiable voting protocol for the Victorian Electoral Commission . In Proceedings of the 5th International Conference on Electronic Voting. Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve Schneider, Sriramkrishnan Srinivasan, and Zhe Xia. 2012a. A supervised verifiable voting protocol for the Victorian Electoral Commission. In Proceedings of the 5th International Conference on Electronic Voting."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of USENIX Security.","author":"Carback Richard","unstructured":"Richard Carback , David Chaum , Jeremy Clark , John Conway , Aleksander Essex , Paul S. Herrnson , Travis Mayberry , Stefan Popoveniuc , Ronald L. Rivest , Emily Shen , Alan T. Sherman , and Poorvi L. Vora . 2010. Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy . In Proceedings of USENIX Security. Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. 2010. Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy. In Proceedings of USENIX Security."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190902894946"},{"key":"e_1_2_1_10_1","article-title":"Faster print on demand for Pr\u00eat \u00e0 Voter","volume":"2","author":"Culnane Chris","year":"2013","unstructured":"Chris Culnane , James Heather , Rui Joaquim , Peter Y. A. Ryan , Steve Schneider , and Vanessa Teague . 2013 . Faster print on demand for Pr\u00eat \u00e0 Voter . USENIX Journal of Election Technology and Systems 2 , 1 (2013). Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider, and Vanessa Teague. 2013. Faster print on demand for Pr\u00eat \u00e0 Voter. USENIX Journal of Election Technology and Systems 2, 1 (2013).","journal-title":"USENIX Journal of Election Technology and Systems"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.20"},{"key":"e_1_2_1_12_1","unstructured":"Chris Culnane Steve Schneider Peter Y. A. Ryan and Vanessa Teague. 2014. vVote: A verifiable voting system. ArXiV eprint: arXiv:1404.6822.  Chris Culnane Steve Schneider Peter Y. A. Ryan and Vanessa Teague. 2014. vVote: A verifiable voting system. ArXiV eprint: arXiv:1404.6822."},{"key":"e_1_2_1_13_1","unstructured":"Roberto Di Cosmo. 2007. On Privacy and Anonymity in Electronic and Non Electronic Voting: The Ballot-as-Signature Attack. Retrieved from http:\/\/hal.archives-ouvertes.fr\/hal-00142440\/en\/.  Roberto Di Cosmo. 2007. On Privacy and Anonymity in Electronic and Non Electronic Voting: The Ballot-as-Signature Attack. Retrieved from http:\/\/hal.archives-ouvertes.fr\/hal-00142440\/en\/."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704279"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_35"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.22"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720294"},{"key":"e_1_2_1_18_1","volume-title":"Towards Trustworthy Elections","author":"Kelsey John","unstructured":"John Kelsey , Andrew Regenscheid , Tal Moran , and David Chaum . 2010. Attacking paper-based E2E voting systems . In Towards Trustworthy Elections . Springer Berlin Heidelberg , 370--387. John Kelsey, Andrew Regenscheid, Tal Moran, and David Chaum. 2010. Attacking paper-based E2E voting systems. In Towards Trustworthy Elections. Springer Berlin Heidelberg, 370--387."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_8"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.32"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the USENIX Accurate Electronic Voting Technology Workshop on Trustworthy Elections.","author":"Magrino Thomas R.","year":"2011","unstructured":"Thomas R. Magrino , Ronald L. Rivest , Emily Shen , and David Wagner . 2011 . Computing the margin of victory in IRV elections . In Proceedings of the USENIX Accurate Electronic Voting Technology Workshop on Trustworthy Elections. Thomas R. Magrino, Ronald L. Rivest, Emily Shen, and David Wagner. 2011. Computing the margin of victory in IRV elections. In Proceedings of the USENIX Accurate Electronic Voting Technology Workshop on Trustworthy Elections."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2008.0149"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033233"},{"key":"e_1_2_1_25_1","volume-title":"Wallach","author":"Sandler Daniel R.","year":"2008","unstructured":"Daniel R. Sandler , Kyle Derr , and Dan S . Wallach . 2008 . VoteBox: A tamper-evident, verifiable electronic voting system. In Proceedings of the 17th USENIX. Daniel R. Sandler, Kyle Derr, and Dan S. Wallach. 2008. VoteBox: A tamper-evident, verifiable electronic voting system. In Proceedings of the 17th USENIX."},{"key":"e_1_2_1_26_1","unstructured":"Victorian Electoral Commission. 2007. Report to Parliament on the 2006 Victorian State Election. Retrieved from https:\/\/www.vec.vic.gov.au\/files\/ER-2006-TheVictorianStateelectionataglance.pdf.  Victorian Electoral Commission. 2007. Report to Parliament on the 2006 Victorian State Election. Retrieved from https:\/\/www.vec.vic.gov.au\/files\/ER-2006-TheVictorianStateelectionataglance.pdf."},{"key":"e_1_2_1_27_1","unstructured":"Douglas Wikstr\u00f6m. 2012. Verificatum. Retrieved from http:\/\/www.verificatum.org\/verificatum\/.  Douglas Wikstr\u00f6m. 2012. Verificatum. Retrieved from http:\/\/www.verificatum.org\/verificatum\/."},{"key":"e_1_2_1_28_1","volume-title":"Young and Moti Yung","author":"Adam","year":"2004","unstructured":"Adam L. Young and Moti Yung . 2004 . Malicious Cryptography - Exposing Cryptovirology. Wiley . Adam L. Young and Moti Yung. 2004. Malicious Cryptography - Exposing Cryptovirology. Wiley."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:58Z","timestamp":1750227418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746338"}},"subtitle":["A Verifiable Voting System"],"short-title":[],"issued":{"date-parts":[[2015,6,9]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,6,9]]}},"alternative-id":["10.1145\/2746338"],"URL":"https:\/\/doi.org\/10.1145\/2746338","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,9]]},"assertion":[{"value":"2014-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}