Academic papers assessing Helios
2008
Helios: Web-based Open-Audit Voting
Ben Adida
Presentation of an early version of helios to the 17th USENIX Security Symposium, 2008
2009
Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios
Ben Adida, Olivier Pereira, Olivier de Marneffe, Jean-Jacques Quisquater
Presentation to Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2009
Usability Study of the Open Audit Voting System Helios
Janna-Lynn Weber, Urs Hengartner
2010
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Saghar Estehghari, Yvo Desmedt
The Helios e-Voting Demo for the IACR
Stuart Haber, Josh Benaloh, Shai Halevi
2011
Running mixnet-based elections with Helios
Philippe Bulens, Damien Giry, Olivier Pereira
Presentation to Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2011
User study of the improved Helios voting system interfaces
Fatih Karayumak, Michaela Kauer, M. Maina Olembo, Tobias Volk, Melanie Volkamer
Adapting Helios for provable ballot privacy
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Fatih Karayumak, Maina M. Olembo, Michaela Kauer and Melanie Volkamer
2013
A generic construction for voting correctness at minimum cost - Application to Helios
Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène
Attacking and fixing Helios: An analysis of ballot secrecy
Véronique Cortier and Ben Smyth
Distributed ElGamal à la Pedersen - Application to Helios
Véronique Cortier, David Galindo, Stéphane Glondu, Malika Izabachène
2014
Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II
Claudia Z. Acemyan, Philip Kortum, Michael D. Byrne, Dan S. Wallach
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Stephan Neumann, M. Maina Olembo, Karen Renaud, and Melanie Volkamer
A Security Analysis of the Helios Voting Protocol and Application to the Norwegian County Election
Kristine Salamonsen (Masters thesis)
2015
Extending Helios Towards Private Eligibility Verifiability
Oksana Kulyk, Vanessa Teague, and Melanie Volkamer
E-Voting and Identity: 5th International Conference, VoteID 2015
Election Verifiability for Helios under Weaker Trust Assumptions
Véronique Cortier, David Galindo, Stéphane Glondu and Malika Izabachène
2016
Internet voting with Helios
Olivier Pereira
Chapter in: Feng Hao and Peter Y. A. Ryan (Eds.), Real-World Electronic Voting: Design, Analysis and Deployment, 2016
The Cloudier Side of Cryptographic End-to-end Verifiable Voting: A Security Analysis of Helios
Nicholas Chang-Fong, Aleksander Essex
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Implementation-level Analysis of the JavaScript Helios Voting Client
Michael Backes, Christian Hammer, David Pfaff, Malte Skoruppa
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
David Bernhard, Olivier Pereira, and Bogdan Warinschi
Adapting Helios for provable ballot privacy
David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
Introducing Proxy Voting to Helios
Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer
Apollo – End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, and Filip Zagórski
Cryptographic Voting — A Gentle Introduction
David Bernhard, Bogdan Warinschi
2017
Machine-Checked Proofs of Privacy for Electronic Voting Protocols
Véronique Cortier, Constantin Cătălin Drăgan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, Bogdan Warinschi
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
David Bernhard, Oksana Kulyk, Melanie Volkamer
2018
E-voting system evaluation based on the Council of Europe recommendations: Helios Voting
Luis Panizo, Mila Gascó, David Y. Marcos del Blanco, José A. Hermida, Jordi Barrat and Héctor Aláiz
IEEE Transactions on Emerging Topics in Computing, 2018
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Karola Marky, Oksana Kulyk, Melanie Volkamer
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth
Exploiting re-voting in the Helios election system
Maxime Meyera, Ben Smyth
Verifiability of Helios Mixnet
Ben Smyth
A foundation for secret, verifiable elections
Ben Smyth
2019
A protocolized, comparative study of Helios Voting and Scytl/iVote
David Y Marcos del Blanco and Mila Gascó
Sixth International Conference on eDemocracy & eGovernment (ICEDEG), 2019
A Framework for I-Voting based on Helios and Public-Key Certificates
Noor Hamad Abid, Sufyan T. Faraj Al-Janabi
A simple alternative to Benaloh challenge for the cast-as-intended property in Helios/Belenios
Véronique Cortier, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani
2020
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board
Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
The Secure I-Voting System Helios++
Noor Hamad Abid, Sufyan T. Faraj Al-Janabi
Verifiable Public Credentials for Stronger End-to-End Verifiability
Sevdenur Baloglu
2021
Helios: Attacks and Formal Models for Verifiability
Panagiotis Grontas
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Ben Smyth, Steven Frink, Michael R. Clarkson