Skip to content

Academic papers assessing Helios

2008

Helios: Web-based Open-Audit Voting
Ben Adida
Presentation of an early version of helios to the 17th USENIX Security Symposium, 2008

2009

Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios
Ben Adida, Olivier Pereira, Olivier de Marneffe, Jean-Jacques Quisquater
Presentation to Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2009

Usability Study of the Open Audit Voting System Helios
Janna-Lynn Weber, Urs Hengartner

2010

Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Saghar Estehghari, Yvo Desmedt

The Helios e-Voting Demo for the IACR
Stuart Haber, Josh Benaloh, Shai Halevi

2011

Running mixnet-based elections with Helios
Philippe Bulens, Damien Giry, Olivier Pereira
Presentation to Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2011

User study of the improved Helios voting system interfaces
Fatih Karayumak, Michaela Kauer, M. Maina Olembo, Tobias Volk, Melanie Volkamer

Adapting Helios for provable ballot privacy
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi

Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Fatih Karayumak, Maina M. Olembo, Michaela Kauer and Melanie Volkamer

2013

A generic construction for voting correctness at minimum cost - Application to Helios
Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène

Attacking and fixing Helios: An analysis of ballot secrecy
Véronique Cortier and Ben Smyth

Distributed ElGamal à la Pedersen - Application to Helios
Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène

2014

Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II
Claudia Z. Acemyan, Philip Kortum, Michael D. Byrne, Dan S. Wallach

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Stephan Neumann, M. Maina Olembo, Karen Renaud, and Melanie Volkamer

A Security Analysis of the Helios Voting Protocol and Application to the Norwegian County Election
Kristine Salamonsen (Masters thesis)

2015

Extending Helios Towards Private Eligibility Verifiability
Oksana Kulyk, Vanessa Teague, and Melanie Volkamer
E-Voting and Identity: 5th International Conference, VoteID 2015

Election Verifiability for Helios under Weaker Trust Assumptions
Véronique Cortier, David Galindo, Stéphane Glondu and Malika Izabachène

2016

Internet voting with Helios
Olivier Pereira
Chapter in: Feng Hao and Peter Y. A. Ryan (Eds.), Real-World Electronic Voting: Design, Analysis and Deployment, 2016

The Cloudier Side of Cryptographic End-to-end Verifiable Voting: A Security Analysis of Helios
Nicholas Chang-Fong, Aleksander Essex
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Implementation-level Analysis of the JavaScript Helios Voting Client
Michael Backes, Christian Hammer, David Pfaff, Malte Skoruppa
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
David Bernhard, Olivier Pereira, and Bogdan Warinschi

Adapting Helios for provable ballot privacy
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi

Introducing Proxy Voting to Helios
Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer

Apollo – End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, and Filip Zagórski

Cryptographic Voting — A Gentle Introduction
David Bernhard, Bogdan Warinschi

2017

Machine-Checked Proofs of Privacy for Electronic Voting Protocols
Véronique Cortier, Constantin Cătălin Drăgan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi

Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
David Bernhard, Oksana Kulyk, Melanie Volkamer

2018

E-voting system evaluation based on the Council of Europe recommendations: Helios Voting
Luis Panizo, Mila Gascó, David Y. Marcos del Blanco, José A. Hermida, Jordi Barrat and Héctor Aláiz
IEEE Transactions on Emerging Topics in Computing, 2018

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Karola Marky, Oksana Kulyk, Melanie Volkamer

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Exploiting re-voting in the Helios election system
Maxime Meyera, Ben Smyth

Verifiability of Helios Mixnet
Ben Smyth

A foundation for secret, verifiable elections
Ben Smyth

2019

A protocolized, comparative study of Helios Voting and Scytl/iVote
David Y Marcos del Blanco and Mila Gascó
Sixth International Conference on eDemocracy & eGovernment (ICEDEG), 2019

A Framework for I-Voting based on Helios and Public-Key Certificates
Noor Hamad Abid, Sufyan T. Faraj Al-Janabi

A simple alternative to Benaloh challenge for the cast-as-intended property in Helios/Belenios
Véronique Cortier, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani

2020

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier, Joseph Lallemand, Bogdan Warinschi

The Secure I-Voting System Helios++
Noor Hamad Abid, Sufyan T. Faraj Al-Janabi

Verifiable Public Credentials for Stronger End-to-End Verifiability
Sevdenur Baloglu

2021

Helios: Attacks and Formal Models for Verifiability
Panagiotis Grontas

Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang

Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Ben Smyth, Steven Frink, Michael R. Clarkson