{"id":"https://openalex.org/W4383221558","doi":"https://doi.org/10.1145/3579856.3596443","title":"Democratizing election verification: new methods for addressing an ancient attacker model","display_name":"Democratizing election verification: new methods for addressing an ancient attacker model","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221558","doi":"https://doi.org/10.1145/3579856.3596443"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3596443","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3596443","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013158281","display_name":"Vanessa Teague","orcid":"https://orcid.org/0000-0003-2648-2565"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Vanessa Teague","raw_affiliation_strings":["Thinking Cybersecurity Pty. Ltd., Democracy Developers Ltd., Australian National University, Australia and Australian National University, Australia"],"raw_orcid":"https://orcid.org/0000-0003-2648-2565","affiliations":[{"raw_affiliation_string":"Thinking Cybersecurity Pty. Ltd., Democracy Developers Ltd., Australian National University, Australia and Australian National University, Australia","institution_ids":["https://openalex.org/I118347636"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013158281"],"corresponding_institution_ids":["https://openalex.org/I118347636"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07031389,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"552","last_page":"552"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9034128785133362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6573141813278198},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6550158262252808},{"id":"https://openalex.org/keywords/aside","display_name":"Aside","score":0.5963135361671448},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5658210515975952},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5520951747894287},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5490003228187561},{"id":"https://openalex.org/keywords/outcome","display_name":"Outcome (game theory)","score":0.4266745448112488},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3909255862236023},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.36715418100357056},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3372856080532074},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.14729121327400208},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.1315298080444336},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.11725261807441711},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.08764642477035522},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.08747410774230957}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9034128785133362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6573141813278198},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6550158262252808},{"id":"https://openalex.org/C2778120072","wikidata":"https://www.wikidata.org/wiki/Q2858150","display_name":"Aside","level":2,"score":0.5963135361671448},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5658210515975952},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5520951747894287},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5490003228187561},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.4266745448112488},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3909255862236023},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.36715418100357056},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3372856080532074},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.14729121327400208},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.1315298080444336},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.11725261807441711},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.08764642477035522},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.08747410774230957},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3596443","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3596443","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W2099480356","https://openalex.org/W152021879","https://openalex.org/W2365629437","https://openalex.org/W2495046216","https://openalex.org/W2072918937","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W4253383623","https://openalex.org/W2350372928"],"abstract_inverted_index":{"Elections":[0],"are":[1,76],"a":[2,58,91],"special":[3],"security":[4],"problem":[5],"because":[6],"it":[7],"is":[8],"not":[9],"good":[10],"enough":[11],"for":[12,125,142],"systems":[13,46],"to":[14],"be":[15,24],"secure":[16],"and":[17,66,78,113,130,136],"results":[18],"correct":[19,92],"-":[20],"they":[21],"must":[22],"also":[23],"verifiably":[25],"so.":[26],"Even":[27],"leaving":[28],"aside":[29],"the":[30,63,74,106,110,143],"psychological":[31],"aspects":[32],"(some":[33],"people":[34],"don\u2019t":[35,39],"believe":[36],"evidence,":[37],"or":[38],"understand":[40],"mathematically-based":[41],"evidence),":[42],"many":[43],"nations\u2019":[44],"election":[45,117],"fall":[47],"far":[48],"short":[49],"of":[50,90,115],"this":[51,54],"goal.":[52],"In":[53],"talk":[55],"I\u2019ll":[56,108,119],"discuss":[57,109],"setting":[59],"increasingly":[60],"common":[61],"in":[62],"US,":[64],"Australia":[65],"elsewhere:":[67],"citizens":[68],"vote":[69],"privately":[70],"on":[71],"paper,":[72],"then":[73,120],"votes":[75],"digitized":[77],"counted":[79],"electronically.":[80],"Sounds":[81],"simple,":[82],"doesn\u2019t":[83],"it?":[84],"But":[85],"producing":[86],"publicly":[87],"verifiable":[88,116],"evidence":[89],"outcome":[93],"requires":[94,102],"carefully-designed":[95],"processes.":[96],"Also,":[97],"running":[98],"these":[99],"processes":[100],"meaningfully":[101],"active":[103],"involvement":[104],"from":[105],"public.":[107],"attacker":[111],"model":[112],"process":[114],"audits.":[118],"explain":[121],"our":[122],"groundbreaking":[123],"techniques":[124],"auditing":[126],"instant-runoff":[127],"(IRV)":[128],"elections":[129],"other":[131],"complex":[132],"social":[133],"choice":[134],"functions,":[135],"describe":[137],"important":[138],"open":[139],"problems,":[140],"particularly":[141],"single":[144],"transferable":[145],"vote.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
