<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Biometric Authentication and Smartphone-Automated Verifiability</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jurlind Budurushi</string-name>
          <email>jurlind.budurushi@dhbw-karlsruhe.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Khalid Abdallah</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Farhan Al Sadi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hosam Zarouk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abdelwahab Almasri</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Armstrong Nhlabatsi</string-name>
          <email>armstrong.nhlabatsi@qu.edu.qa</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Internet Voting, Biometric Authentication, Coercion Resistance, Usability, Verifiability</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Baden-Württemberg Cooperative State University Karlsruhe</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Proceedings EGOV-CeDEM-ePart conference</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Qatar University</institution>
          ,
          <country country="QA">Qatar</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>Although extensively used, studied, and continuously improved, the current implementation of Helios sufers from various security and usability shortcomings. From a security point of view, the reliance on a single factor for voter authentication makes it susceptible to impersonation attacks. Furthermore, the exposure of voters' identities alongside their respective ballot trackers on the bulletin board compromises voter participation privacy. Regarding usability a significant issue resides in the complexity of the vote verification process, particularly challenging for non-technical voters dealing with large encrypted datasets. This paper tackles these shortcomings in the implementation of Helios, improving both its security and usability aspects. From a security perspective, we enhance the voter authentication mechanism by integrating biometric authentication into Helios. Additionally, we ensure voter participation privacy by dissociating voters' identities from their ballot trackers on the bulletin board, while mitigating potential clash attacks. In terms of usability enhancements, we introduce a QR code mechanism along with the implementation of a corresponding mobile application authenticator, making the vote verification process simpler and more eficient for voters.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Internet voting continues to attract the interest of the scientific community, decision-makers, and
political spheres due to its potential to transform electoral processes. In theory, internet voting ofers a
spectrum of benefits, including improved voter accessibility and convenience. However, it also poses
significant drawbacks, such as security vulnerabilities, usability issues, and technical complexities.
Consequently, practical engagement with internet voting is imperative to explore and better understand
its advantages, in particular for addressing existing challenges efectively.</p>
      <p>
        Helios [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], an open-source internet voting system, has been instrumental in exploring practical
aspects, enabling a deeper understanding of the benefits and drawbacks associated with internet voting.
Hence, Helios has undergone extensive examinations, covering aspects of usability [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ] and security
[
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. Its refinement has addressed various factors, such as trust assumptions [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and participation
privacy [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Moreover, Helios has served as the foundation for the development of novel systems,
e.g., the Zeus voting system [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], and the Apollo voting system [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Furthermore, Helios has been
used in small-scale election settings, including the ACM general elections [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and since 2010 in the
elections of the International Association for Cryptologic Research (IACR)2. However, the current
Helios implementation sufers from various security and usability shortcomings. One of the key
security limitations involves its reliance on a single factor for voter authentication, which exposes
the system to threats of impersonation [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. To enhance authentication robustness, we incorporate
LGOBE
∗Corresponding author.
      </p>
      <p>CEUR
Workshop</p>
      <p>
        ISSN1613-0073
biometric verification as a second factor. To ensure the confidentiality of biometric data, our approach
employs privacy-preserving cryptographic techniques [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Another concern arises from the public
association of voter identities with their corresponding ballot trackers on the election bulletin board,
which compromises voter anonymity and participation privacy [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. To address this, we decouple voter
identities from their ballot trackers on the bulletin board, while at the same time mitigating potential
ballot copying [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and clash attacks [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In terms of usability, the verification process can be complex
and inaccessible, particularly for non-expert users who may struggle with cryptographic procedures
[
        <xref ref-type="bibr" rid="ref3 ref4">4, 3</xref>
        ]. To improve usability and promote greater voter engagement, we introduce a QR code-based
verification mechanism, supported by a dedicated mobile application. This enhancement simplifies the
end-to-end verification workflow, making it more intuitive and eficient for all users.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>This section lays the foundation of our work. We introduce the concept of end-to-end verifiability in
internet voting and provide an overview of the Helios voting system. Additionally, we review relevant
literature and discuss related works.</p>
      <sec id="sec-2-1">
        <title>2.1. End-to-end verifiability in Internet voting</title>
        <p>
          End-to-end verifiability in internet voting, similar to traditional and electronic voting at polling stations,
refers to the ability to verify the correctness of every step in the election process. End-to-end verifiability
aligns with the public nature of elections principle established by the German Federal Constitutional
Court in 2009. This principle mandates that any voter should be able to verify each essential step of the
election and its outcome reliably and without needing expert knowledge [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          Based on the systematization of knowledge on verifiability notions in electronic voting [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ],
end-toend verifiability comprises two components: individual verifiability and universal verifiability . Individual
verifiability includes cast-as-intended, which ensures the voter’s intention is correctly captured during
casting, and recorded-as-cast, which guarantees the vote remains unaltered until tallying. Universal
verifiability, or tallied-as-recorded, ensures that all recorded votes are accurately tallied and verified.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. The Helios voting system</title>
        <p>
          Overview – Helios is an open-source, end-to-end verifiable web-based voting system built on a
traditional client-server architecture [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Users can access the system via any modern web browser, while
the server can be either self-hosted or hosted by the Helios maintainers. Helios is designed for elections,
where election integrity and ballot secrecy are important, but the risk of coercion is minimal. Typical
use cases include student government elections and elections within non-governmental organizations.
The election process using Helios can be separated into three steps: election management, voting, and
auditing [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
        <p>Election management – In this step, the election administrator creates the election by defining
its name, the voter list, the voting options, the election configurations (such as closed or open voter
lists, voter support contact address, use of voter aliases, and randomization of voting options), and the
trustees1. Trustees are crucial for maintaining vote secrecy. Each trustee generates a public/private key
pair and uploads the public key to the Helios server. During the tally, trustees use their private keys to
decrypt the votes.</p>
        <p>After setting up the election, the administrator freezes it and invites the voters to participate via
email. The invitation includes the election description, a unique election fingerprint, a link to the
online voting booth, and voter credentials. Helios also supports third-party authentication services like
Google, Facebook, or custom SSO/LDAP servers, in which case the invitation email does not include
voter credentials.
1The Helios server serves by default a trustee. However, the server be can be removed from the trustees’ list and any number
of new trustees can be added.</p>
        <p>Voting – Upon receiving their invitation, voters can begin the voting process by visiting the online
voting booth and selecting their preferred choices. After reviewing and confirming their selection, the
ballot is encrypted to ensure vote secrecy and a unique ballot tracker is displayed. Voters should record
this ballot tracker, which uniquely identifies their encrypted ballot, either by printing or writing it
down.</p>
        <p>Voters can then choose to submit the encrypted ballot to the Helios server or verify that it accurately
reflects their selection. If the voter decides to verify, Helios reveals the randomness used in the ballot
encryption. Thereby, the voter can use any third party tool to verify the correctness of the ballot
encryption process. To verify and be convinced about the correctness of the ballot encryption process,
voters repeat these steps (select and then verify) any number of times. This verification process, referred
as the Benaloh challenge [18], ensures cast-as-intended verifiability. Note that the voter cannot submit
the verified ballot, because this would allow voters to prove to a third party how they voted, and
consequently allow vote selling or buying.</p>
        <p>When ready to submit, voters enter their credentials and send the encrypted ballot to the Helios server.
The ballot tracker allows voters to verify that their ballot was received and stored correctly, ensuring
recorded-as-cast verifiability. Entering credentials at the final step prevents a compromised Helios
system from targeting specific voter populations, e.g., elderly voters might not necessary verify or repeat
the verification step more than once. To summarize, if the encrypted ballot contains a modified selection,
the cast-as-intended verification would detect it. If the encrypted ballot is modified at submission, the
change in the ballot tracker would reveal the discrepancy.</p>
        <p>Auditing – The election audit step involves both individual and universal verifiability. Individual
verifiability, ensured by voters during the voting step, allows them to verify their own ballots. Universal
verifiability occurs during the tally process and can be audited by anyone.</p>
        <p>After voting concludes, the Helios server computes the election tally by aggregating the cast ballots
using the homomorphic properties of the encryption scheme, which ensures vote secrecy. Trustees then
decrypt the encrypted tally using their private keys, performing partial decryption publicly. Once the
tally is complete and decrypted, all information needed to verify the election tally is available from the
Helios server, except for the trustees’ private keys, which are not required for the audit. To minimize the
risk of compromising vote secrecy in the future, it is recommended that trustees destroy their private
keys after the tally.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Related work</title>
        <p>
          Helios [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], is an open-source and well-established system designed for verifiable internet voting. It has
been used in various electoral contexts, such as the University president election at UC Louvain [19],
the ACM general elections [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], and since 2010 in the elections of the International Association for
Cryptologic Research (IACR)2. Consequently, Helios has been extensively studied in the literature, and
several usability and security enhancements, as well as feature extensions, have been proposed.
        </p>
        <p>
          Many of the proposed enhancements focus on strengthening vote integrity. For example, the Zeus
voting system [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], the Apollo voting system [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], the Selene voting protocol [20], and the proposals
by Bernhard et al. [21], Escala et al. [22], and Guasch et al. [23] introduce diferent ways and new
security mechanisms to ensure individual verifiability . In contrast to these proposals, we do not modify
the current individual verifiability process in Helios, but rather improve it by using QR codes and
implementing a mobile application that supports voters in executing the required verification steps
[
          <xref ref-type="bibr" rid="ref4 ref5">24, 4, 5</xref>
          ]. Furthermore, contrary to [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], our integration of QR codes in the verification process not only
goes beyond a theoretical proposal but also eliminates the need for a trusted third-party.
        </p>
        <p>
          Other proposals focus on improving eligibility of voters, e.g.,[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], [25], [26], [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and [27]. While [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]
and [25] introduce modifications concerning only verifiable eligibility , such as requiring voters to sign
their ballots upon casting or token-based encryption, [26] introduces strong receipt-freeness, and [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]
and [27] achieve private eligibility verifiability . Similar to [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] and [25], our enhancement achieves voter
eligibility by enhancing the voter registration and authentication process through the integration of
biometrics. Note that the privacy of biometric attributes is protected by a cryptographic secret sharing
scheme [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. Furthermore, in accordance with [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and [27], our enhancement supports private eligibility
verifiability . To support private eligibility verifiability , we remove the link between voters and their
corresponding ballot trackers on the public bulletin board. Our enhancement not only safeguards voter
anonymity, but also mitigates ballot copying [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] and clash attacks [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Moreover, unlike [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and [27],
our enhancement mitigates the challenge of overcrowding the bulletin board. Building on the notion of
strong receipt-freeness [26], we introduce the notion of practical coercion-resistance. We achieve practical
coercion-resistance by allowing voters to update their vote and assuming that voters are not under the
influence of a coercer during the entire election period.
        </p>
        <p>
          To summarize, our enhancements surpass mere theoretical conjecture, as we have substantiated
our proposal into tangible outcomes by implementing a robust proof of concept. While our literature
investigation encompasses insights into usability and security enhancements related to vote integrity
and voter eligibility, it is essential to acknowledge the existence of additional research that delve into
alternative aspects of improving the usability and security of Helios. For instance, [19] improves vote
privacy and fairness, [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] introduces distributed tallying, [28] ensures long term privacy, [29] enables a
boardroom voting setting, [30] enables proxy voting, [31] introduces blind ballot copying, [32] supports
quadratic voting, and [
          <xref ref-type="bibr" rid="ref2">2, 24</xref>
          ] improve usability of the interfaces. These works, while significant, fall
outside our current scope.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Implementation</title>
      <p>This section provides an overview of the principal extended and newly introduced components in Helios,
based on forking the main Helios branch on GitHub3. Thereby, we describe the high-level system
architecture, the integration of biometric authentication, and the implemented mobile application
HelioScan. Other important adaptations of Helios, such as the structural model and databases, are
documented on GitHub4.</p>
      <sec id="sec-3-1">
        <title>3.1. High level system architecture</title>
        <p>To enable and facilitate improvements of Helios security and usability, it is necessary to extend and
integrate new components and functionality to the base of the Helios architecture. Figure 1 illustrates
the Helios architecture, with new components and functionalities added to the base system, highlighted
in red boxes. Note that we have derived the current Helios architecture by thoroughly investigating the
corresponding documentation and code.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Biometric registration and authentication</title>
        <p>When a user, for example an admin, a voter, or a trustee, registers for the first time in Helios, the
user can register through one of the third-party authenticator options Helios implements, i.e., Google
or GitHub. Thus, the user is redirected to the corresponding authenticator page and is required to
authenticate using their respective Google5 or GitHub6 account. After successful authentication, the
third-party authenticator sends Helios the required information about the user contained in an OAuth
token7, such as name and email. This information is subsequently stored on the Helios database server
for use in future authentication processes.</p>
        <p>We extended the existing registration and authentication process by integrating the APIs of Regula
Forensics8, hence adding facial recognition as an additional security layer. As a result, the registration
3https://github.com/benadida/helios
4https://github.com/Jurlind/Enhanced_Helios_QatarUniversity
5https://www.google.com/account/about/
6https://github.com/signup
7https://auth0.com/docs/
8https://docs.regulaforensics.com/develop/face-sdk/
and authentication processes for eligible voters remain the same but are now supplemented with
biometric data. Although we acknowledge that the use of a proprietary solution may be considered
a limitation, we have opted for this approach because of its ease of integration and the reliability it
ofers for biometric authentication. Specifically, the solution includes a mechanism that requires users
to rotate their heads during authentication, efectively mitigating the risk of masquerading attacks,
such as the use of photographs to impersonate the user. Moreover, the solution provides the option to
use a self-hosted server, which presents a plausible compromise to securely handle sensitive biometric
data, thus maintaining control over data storage and privacy. Given the modularity of our extensions,
integrating open-source alternatives that provide the same level of reliability should be straightforward,
allowing for greater flexibility and adaptability in future implementations.</p>
        <p>
          Figure 2 shows the extended user registration and authentication workflow. Initially, during the
registration phase, the user’s face (whether admin, voter, or trustee) is captured and encoded into a
base64 string. This string is divided into three arrays R, G and B, representing the RGB color model
[33]. Each array represents the pixel intensity values and has a size of 1280x720 pixels. In addition,
three random arrays of the same size are generated, denoted R-rand, G-rand, and B-rand. Afterwards,
each array is multiplied in element-wise order with its corresponding random array. For example, if the
R array is [
          <xref ref-type="bibr" rid="ref1 ref2 ref6 ref7">1, 7, 0, 2, 6</xref>
          ], and the R-rand array is [
          <xref ref-type="bibr" rid="ref2 ref3 ref6 ref8 ref9">3, 6, 8, 2, 9</xref>
          ], their multiplication results in [
          <xref ref-type="bibr" rid="ref3 ref4">3, 42, 0, 4,
54</xref>
          ]. This process is repeated for the G and G-rand, as well as for the B and B-rand arrays. The Helios
database server retains two sets of arrays: one containing two of the generated random arrays, and the
other containing the multiplied arrays, denoted R-mul, G-mul, and B-mul, that do not belong to any
of the retained random arrays. The distribution and allocation mechanism that determines whether
Helios retains the data R, G, or B is determined by a random number generated ranging from 1 to 3.
For example, if the random number is 2, the Helios database server receives R-rand, B-rand, and the
multiplied array G-mul. On the other hand, the external server receives the third random array, whose
corresponding data is stored on the Helios database server, and the two remaining multiplied arrays
R, G, B. Following the example above, the external server receives G-rand and the multiplied arrays
B-mul and R-mul. Hence, the biometric data, specifically an image of the user’s scanned face, is split
into two sets of shares. One set is stored on a server hosted by a third-party, while the other is stored
on the Helios database server, alongside the data from the original registration process. This ensures
that neither party has the complete information necessary to reconstruct any part of the original image,
thus implementing a form of visual secret sharing [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. It is important to emphasize that storing the
biometric shares separately protects users’ biometric data in the event of any accidental or malicious
compromise of any of the two database servers.
        </p>
        <p>Note that if the user is already registered, the third-party authentication step via Google or Github
remains the same. This means that after successful authentication, at the corresponding third-party, the
received OAuth token is compared with the information previously stored on the Helios database server.
The diference arises when biometric authentication is used. Hence, in the authentication phase, after
the user’s face is scanned through the facial recognition API, the corresponding biometric data is passed
to the Helios Authentication Service. The scanned data are then compared to the previously stored
biometric data, which is requested and reconstructed from the shares stored in the separate databases.9
This reconstruction process involves performing a division for each of the multiplied arrays R, G, B with
their corresponding arrays R-rand, G-rand, and B-rand. These shares are uploaded from both the Helios
server and the external server. Afterwards, Helios compares the recently scanned user’s face, thus the
resulting base64 string, with the reconstructed base64 string for the respective user by computing a
similarity index between the two strings. This similarity index is a floating-point number between 0
and 1. When this number is closer to 0, the higher the probability that the user logging in is genuine. If
the similarity index is less than 0.45, access is granted. However, if the index exceeds 0.45, access is
denied and the user must re-scan their face. After three failed attempts, the session is terminated and
access to the account is denied for a period of 1 hour. It is important to note that the threshold of three
failed authentication attempts followed by a 1 hour lockout has been set solely for the proof of concept
(PoC), but can be adjusted to align with the specific needs or legal requirements of the election.
9Note that the biometric data is only fully accessible at the time of initial registration and during authentication attempts. If
an attacker gains control of the systems at these points, the biometric privacy of the voter is compromised.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. HelioScan - Automating individual verifiability</title>
        <p>The HelioScan application is implemented and designed to ofer voters a straightforward verification
experience, focusing on simplicity and clarity. HelioScan uses the Flutter 10 framework, an open-source
platform created by Google, and is built using the Dart 11 programming language. HelioScan can be
used on the two most common mobile operating systems, namely iOS12 and Android13.</p>
        <p>Upon launching the app, voters are greeted with a welcome message and a concise guide on how to
navigate the system for verification purposes, refer to figure 3 a). After familiarizing themselves with
the instructions, voters can proceed by clicking the start button. The next screen presents, depicted in
ifgure 3 b), voters with a list of elections they have participated in via the app. At this point, voters have
two options: they can either select one of the listed elections to perform verification functionalities or
update the registered ballot tracker, or scan a new QR code for a diferent election. Choosing to scan a
new QR code leads the app to save the corresponding ballot tracker in the database and guide the voter
to a specific welcome page for that election, outlined in figure 3 c).</p>
        <p>(a) Home Page
(b) List of Participated Elections
(c) Election Welcome Page</p>
        <p>This is only done after verifying the uniqueness of the ballot tracker in the particular election by
communicating with the third-party verification server. After its uniqueness is confirmed, the ballot
tracker is also saved to the list of ballot trackers present in the third-party verification server database.
Thus, if the voter’s ballot tracker is confirmed to be unique, it indicates that the system is functioning
correctly, and no clash attack is detected. Consequently, the server stores the ballot tracker in its
database and sends a success message to HelioScan, allowing the app to save the ballot tracker in its
mobile database. However, if a potential clash attack is detected, i.e., the ballot tracker is not unique,
the server sends a failure message to HelioScan to alert the voter.</p>
        <p>In the vote-casting phase, voters can verify the integrity of their ballot tracker between voting pages
until successful casting. Following the instructions mentioned in the Helios interfaces, voters can scan
the QR code of the ballot tracker each time it appears, from the first moment to successful casting. This
process protects against manipulation of the voter’s ballot tracker, as the ballot tracker is stored in
the app once the voter scans it. Thus, any potential modification of the ballot tracker before casting
would be detected. In addition, voters can verify the correct construction of the ballot tracker, i.e.,
cast-as-intended by scanning the QR code shown on the Helios Spoil and Verify page. While the current
version of the app receives the verification result from Helios and therefore relies on its’ computation,
it is straightforward to migrate the computation process to the app itself or any existing verification
application trusted by the voters, to ensure independence from the Helios server. This enables the
10https://flutter.dev
11htps://dart.dev
12https://www.apple.com/de/ios/ios-17/
13https://www.android.com/
automation of the cast-as-intended verification step and guarantees that the large cryptographic text
displayed in Helios does indeed correspond to the voter’s selection, as well as the corresponding ballot
tracker matches with the one previously scanned by the voter, shown in figure 4 a).
(a) HelioScan - Verifying that the ballot tracker has
not been modified.
(b) HelioScan - Verifying that the scanned ballot
tracker exists.</p>
        <p>Next, voters can automatically perform the stored-as-cast verifiability step by verifying the existence
of the scanned ballot tracker on the election bulletin board. Thereby, the voter navigates to the election
bulletin board and scans the QR code displayed there, see figure 5. This QR code contains the ballot
trackers for all cast ballots. Hence, this allows voters to automatically verify if their previously scanned
ballot tracker exists, as shown in figure 4 b). While we acknowledge the inherent limitation of a single
QR code in terms of the amount of data it can store, for the sake of simplicity in demonstrating our
Proof of Concept (PoC) for automating the stored-as-cast verification process, we have opted to use a
single QR code. We assume that this QR code has suficient capacity to hold all the cast ballots. An
alternative solution could involve using multiple QR codes, which would be time-sequenced, requiring
the voter to scan only the QR code relevant to the specific time of vote casting. Further alternatives
and considerations regarding the automation of the stored-as-cast verification process are discussed in
section 4.</p>
        <p>Finally, whenever voters revote or verify the correct construction of the ballot tracker, a new ballot
tracker with a new QR code is generated. Voters simply need to scan this code again to update their
record in the app, after which they can perform any of the stated functionality on the updated ballot
tracker. Overall, with this approach, 3 separate QR codes are generated. The first QR code, which
contains the ballot tracker, is displayed after selecting the preferred option and before casting or
verifying it. The second QR code is shown on the bulletin board above all the ballot trackers. This QR
code contains all valid and invalid ballot trackers, which are retrieved from the Helios database server
through a GET HTTP request. The third QR code is displayed on the Spoil and Verify page once a voter
decides to verify (instead of casting) the ballot and is computed by getting/retrieving the verification
result of the current ballot parameters.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>This section outlines the security assumptions of the enhancements and discusses alternative approaches
to strengthen or implement them.</p>
      <sec id="sec-4-1">
        <title>4.1. Security assumptions</title>
        <p>As described in section 3 our extensions are implemented upon the underlying Helios architecture.
Therefore, the core security assumptions inherent to Helios persist; for instance, the private keys of the
Helios server are secure, potential vote manipulations are detected when voters verify, and trustees
behave according to the protocol. Although our enhancements augment the existing security framework
of Helios, such as by integrating biometric authentication, ensuring private eligibility verifiability and
achieving practical coercion-resistance - the incorporation of novel components or parties introduces
additional assumptions:</p>
        <p>Assumption 1 - Limited presence of a coercer: We assume that coercers are not consistently present
with voters throughout the duration of the election.</p>
        <p>Assumption 2 - Trusted third-party for biometric authentication: We assume that any third-party
engaged in the authentication process, responsible for requesting the secret shares of stored biometric
data and reconstructing them for comparison with voters’ current facial features, is trustworthy in
safeguarding the reconstructed and scanned biometric data and accurately reporting the comparison
results. Such a service could be a publicly administered platform, used by users in diferent contexts.
Examples include government identity verification systems or social security services. Furthermore, it
is important to highlight that the current Helios system relies on third-party authentication providers,
such as Google or GitHub, which ofer Multi-Factor Authentication (MFA), though it is not enforced
within the Helios framework itself. In contrast, our solution not only enforces MFA but also ofers
the flexibility of using a self-hosted server for two-factor authentication, providing full control over
the process - especially crucial when handling sensitive biometric data as the second authentication
factor. Although both solutions still rely on third-party servers, our approach ensures these servers are
independent of the Helios system and public service providers, safeguarding sensitive authentication
information by preventing its storage on external servers, thus enhancing both security and privacy.</p>
        <p>Assumption 3 - Trusted verifiability application: We assume that the HelioScan application, or any
other application that ofers similar functionality, is deemed reliable for accurately determining the
uniqueness of the ballot tracker and for performing individual verifiability .</p>
        <p>Assumption 4 - Trusted third-party verification server: We assume that any third-party involved in
the individual verification process reliably provides the accurate data set of the cast ballots, which are
stored on the Helios database server.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Alternative approaches</title>
        <p>While our enhancements do not require or impose alterations to the underlying Helios architecture,
there are alternative methods to implement or to strengthen these improvements.</p>
        <p>In the context of integrating biometric authentication, an alternative approach involves entrusting a
single entity with the responsibilities of facial recognition and biometric data storage. This alternative
ofers the primary advantage of streamlined integration into Helios, as it eliminates the need for
additional implementation eforts while also enhancing the eficiency of the facial recognition process.
However, this alternative introduces a single point of failure and lacks control over cryptographic
protocols, such as the implementation of secret-sharing schemes. Another approach involves
implementing secure multiparty computation [34] in both the registration and authentication process. This
ensures the privacy of biometric data, because the parties involved cannot learn anything more than
the prescribed output. An alternative to ensure the privacy of biometric data is the implementation of
biometric cryptosystems [35].</p>
        <p>Regarding the third-party verification server, an alternative approach is to directly verify the data set
of the cast ballots on the Helios database server, which functions as the bulletin board. This method
improves the current implementation from both the security and performance perspectives. A similar
approach can be applied to third-party verification applications, such as HelioScan. In this way, the
computations to verify cast-as-intended and the uniqueness of the ballot tracker (stored-as-cast) can be
migrated to the app itself or to any existing verification application trusted by voters. Although this
approach improves security, it requires additional implementation or integration with other verification
applications trusted by voters.</p>
        <p>Finally, there are proposals that achieve coercion resistance in the context of internet voting, such
as those by Juels et al. [36], Araújo et al. [37], and Locher et al. [38]. However, implementing
these approaches in Helios would require substantial modifications to the underlying vote casting
and individual verifiability processes. Furthermore, these proposals face several challenges regarding
usability, security and trust, including unrealistic assumptions, lack of self-eficacy, limited interactive
feedback, and acceptance issues [39].</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>Overall, this article contributes to the ongoing discourse on internet voting security and usability,
providing practical solutions to enhance the integrity and accessibility of electoral processes. Specifically,
this paper addresses important usable security shortcomings in Helios. By integrating biometric
authentication into Helios and enhancing voter authentication, alongside dissociating voters’ identities
from their ballot trackers, we have fortified its security. Furthermore, the introduction of a QR code
mechanism and the corresponding mobile application authenticator has streamlined the vote verification
process, enhancing usability for voters. Although our enhancements represent significant progress
in addressing the identified shortcomings, they are not without limitations. Hence, more research is
essential to advance the field and ensure the trustworthiness, reliability, and acceptance of internet
voting systems in democratic societies.</p>
      <p>For future work, we plan to implement the verification computations in the mobile application and
provide an independent verifiability app. Thus, we can eliminate the need for a third-party verification
server, hence reducing assumptions, simplifying the system architecture, and improving performance.
Furthermore, we plan to investigate, evaluate, and integrate existing solutions of secure-multiparty
protocols or biometric cryptosystems to reduce trust assumptions regarding biometric authentication.
Finally, we plan to conduct a user study to evaluate the efectiveness of security enhancements and
mobile application interfaces, while focusing on individual verifiability. Our objective is to evaluate the
alternatives for automating individual verifiability, focusing on their impact on user experience and
verification efectiveness. Understanding how users interact with the system and perceive its security
features is crucial to refine the user experience, increase trust, and ensure widespread acceptance.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used ChatGPT to verify grammar and spelling,
paraphrase, and reword. After using this service, the authors reviewed and edited the content as needed
and assume full responsibility for the content of the publication.
[18] J. Benaloh, Simple verifiable elections., EVT 6 (2006) 5–5.
[19] B. Adida, O. De Marnefe, O. Pereira, J.-J. Quisquater, et al., Electing a university president using
open-audit voting: Analysis of real-world use of helios, EVT/WOTE 9 (2009).
[20] P. Ryan, P. Rønne, V. Iovino, Selene: Voting with transparent verifiability and coercion-mitigation,</p>
      <p>IACR Cryptology ePrint Archive 2015 (2015) 1105.
[21] D. Bernhard, O. Pereira, B. Warinschi, How not to prove yourself: Pitfalls of the fiat-shamir heuristic
and applications to helios, in: Advances in Cryptology–ASIACRYPT 2012: 18th International
Conference on the Theory and Application of Cryptology and Information Security, Beijing, China,
December 2-6, 2012. Proceedings 18, Springer, 2012, pp. 626–643.
[22] A. Escala, S. Guasch, J. Herranz, P. Morillo, Universal cast-as-intended verifiability, in: International</p>
      <p>Conference on Financial Cryptography and Data Security, Springer, 2016, pp. 233–250.
[23] S. Guasch, P. Morillo, How to challenge and cast your e-vote, in: International Conference on</p>
      <p>Financial Cryptography and Data Security, Springer, 2016, pp. 130–145.
[24] F. Karayumak, M. Kauer, M. M. Olembo, T. Volk, M. Volkamer, User study of the improved helios
voting system interfaces, in: 2011 1st Workshop on Socio-Technical Aspects in Security and Trust
(STAST), IEEE, 2011, pp. 37–44.
[25] S. Srinivasan, C. Culnane, J. Heather, S. Schneider, Z. Xia, Countering ballot stufing and
incorporating eligibility verifiability in helios, in: Network and System Security: 8th International Conference,
NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings 8, Springer, 2014, pp. 335–348.
[26] V. Cortier, G. Fuchsbauer, D. Galindo, Beleniosrf: A strongly receipt-free electronic voting scheme.,</p>
      <p>IACR Cryptol. ePrint Arch. 2015 (2015) 629.
[27] D. Bernhard, O. Kulyk, M. Volkamer, Security proofs for participation privacy and stronger
verifiability for helios, CRISP-Center for Research in Security and Privacy, 2016.
[28] D. Demirel, J. Van De Graaf, R. S. dos Santos Araújo, Improving helios with everlasting privacy
towards the public., Evt/wote 12 (2012).
[29] O. Kulyk, S. Neumann, M. Volkamer, C. Feier, T. Koster, Electronic voting with fully distributed
trust and maximized flexibility regarding ballot design, in: 2014 6th International Conference on
Electronic Voting: Verifying the Vote (EVOTE), IEEE, 2014, pp. 1–10.
[30] O. Kulyk, K. Marky, S. Neumann, M. Volkamer, Introducing proxy voting to helios, in: 2016
11th International Conference on Availability, Reliability and Security (ARES), 2016, pp. 98–106.
doi:10.1109/ARES.2016.38.
[31] Y. Desmedt, P. Chaidos, Applying divertibility to blind ballot copying in the helios internet
voting system, in: Computer Security–ESORICS 2012: 17th European Symposium on Research in
Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17, Springer, 2012, pp. 433–450.
[32] S. Park, R. L. Rivest, Towards secure quadratic voting, Cryptology ePrint Archive, Paper 2016/400,
2016. https://eprint.iacr.org/2016/400.
[33] T. Young, II. The Bakerian Lecture. On the theory of light and colours, Philosophical transactions
of the Royal Society of London 92 (1802) 12–48. doi:10.1098/rstl.1802.0004.
[34] Y. Lindell, Secure multiparty computation, Communications of the ACM 64 (2020) 86–96.
[35] C. Rathgeb, A. Uhl, A survey on biometric cryptosystems and cancelable biometrics, EURASIP
journal on information security 2011 (2011) 1–25.
[36] A. Juels, D. Catalano, M. Jakobsson, Coercion-resistant electronic elections, in: Proceedings of the
2005 ACM Workshop on Privacy in the Electronic Society, 2005, pp. 61–70.
[37] R. Araujo, S. Foulle, J. Traoré, A practical and secure coercion-resistant scheme for internet voting,
in: Towards Trustworthy Elections: New Directions in Electronic Voting, Springer, 2010, pp.
330–342.
[38] P. Locher, R. Haenni, R. E. Koenig, Coercion-resistant internet voting with everlasting privacy, in:
Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING,
and WAHC, Christ Church, Barbados, 2016, Revised Selected Papers 20, Springer, 2016, pp. 161–175.
[39] O. Kulyk, S. Neumann, Human factors in coercion resistant internet voting–a review of existing
solutions and open challenges, in: Sixth International Joint Conference on Electronic Voting
(E-Vote-ID 2020), TalTech press, 2020.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Adida</surname>
          </string-name>
          , Helios:
          <article-title>Web-based Open-Audit Voting</article-title>
          .,
          <source>in: USENIX security symposium</source>
          , volume
          <volume>17</volume>
          ,
          <year>2008</year>
          , pp.
          <fpage>335</fpage>
          -
          <lpage>348</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Karayumak</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Olembo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kauer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Volkamer</surname>
          </string-name>
          ,
          <article-title>Usability analysis of helios-an open source verifiable remote electronic voting system</article-title>
          ,
          <source>in: 2011 Electronic Voting Technology Workshop/- Workshop on Trustworthy Elections (EVT/WOTE 11)</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kulyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Henzel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Renaud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Volkamer</surname>
          </string-name>
          ,
          <article-title>Comparing “challenge-based” and “code-based” internet voting verification implementations</article-title>
          , in: D.
          <string-name>
            <surname>Lamas</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Loizides</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Nacke</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Petrie</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Winckler</surname>
          </string-name>
          , P. Zaphiris (Eds.),
          <string-name>
            <surname>Human-Computer</surname>
            <given-names>Interaction - INTERACT</given-names>
          </string-name>
          <year>2019</year>
          , Springer International Publishing, Cham,
          <year>2019</year>
          , pp.
          <fpage>519</fpage>
          -
          <lpage>538</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Neumann</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Olembo</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Renaud</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Volkamer</surname>
          </string-name>
          ,
          <article-title>Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both?</article-title>
          ,
          <source>in: Electronic Government and the Information Systems Perspective: Third International Conference, EGOVIS</source>
          <year>2014</year>
          , Munich, Germany, September 1-
          <issue>3</issue>
          ,
          <year>2014</year>
          . Proceedings 3, Springer,
          <year>2014</year>
          , pp.
          <fpage>246</fpage>
          -
          <lpage>260</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>K.</given-names>
            <surname>Marky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kulyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Renaud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Volkamer</surname>
          </string-name>
          ,
          <article-title>What did i really vote for? on the usability of verifiable e-voting schemes</article-title>
          ,
          <source>in: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI '18</source>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2018</year>
          , p.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .1145/3173574.3173750.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Cortier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Galindo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Glondu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Izabachene</surname>
          </string-name>
          ,
          <article-title>Election verifiability for helios under weaker trust assumptions</article-title>
          , in: Computer Security-ESORICS
          <year>2014</year>
          : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-
          <issue>11</issue>
          ,
          <year>2014</year>
          . Proceedings,
          <source>Part II 19</source>
          , Springer,
          <year>2014</year>
          , pp.
          <fpage>327</fpage>
          -
          <lpage>344</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kulyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Teague</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Volkamer</surname>
          </string-name>
          ,
          <article-title>Extending helios towards private eligibility verifiability</article-title>
          , in: E-Voting and Identity: 5th International Conference, VoteID
          <year>2015</year>
          , Bern, Switzerland, September 2-
          <issue>4</issue>
          ,
          <year>2015</year>
          , Proceedings 5, Springer,
          <year>2015</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>73</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Tsoukalas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Papadimitriou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Louridas</surname>
          </string-name>
          , From helios to zeus,
          <source>USENIX Journal of Election Technology and Systems (JETS) 1</source>
          (
          <issue>2013</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Gaweł</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kosarzecki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. L.</given-names>
            <surname>Vora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zagórski</surname>
          </string-name>
          ,
          <article-title>Apollo-end-to-end verifiable internet voting with recovery from vote manipulation</article-title>
          , in: Electronic Voting: First International Joint Conference,
          <string-name>
            <surname>E-Vote-ID</surname>
          </string-name>
          <year>2016</year>
          , Bregenz, Austria,
          <source>October 18-21</source>
          ,
          <year>2016</year>
          , Proceedings 1, Springer,
          <year>2017</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Staf</surname>
          </string-name>
          ,
          <article-title>Acm's 2014 general election: please take this opportunity to vote, Commun</article-title>
          . ACM
          <volume>57</volume>
          (
          <year>2014</year>
          )
          <fpage>9</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .1145/2597769.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bonneau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Herley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. C. v.</given-names>
            <surname>Oorschot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Stajano</surname>
          </string-name>
          ,
          <article-title>The quest to replace passwords: A framework for comparative evaluation of web authentication schemes</article-title>
          ,
          <source>in: 2012 IEEE Symposium on Security and Privacy</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>553</fpage>
          -
          <lpage>567</lpage>
          . doi:
          <volume>10</volume>
          .1109/SP.
          <year>2012</year>
          .
          <volume>44</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Naor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          ,
          <article-title>Visual cryptography</article-title>
          ,
          <source>in: Advances in Cryptology-EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May</source>
          <volume>9</volume>
          -
          <issue>12</issue>
          ,
          <year>1994</year>
          Proceedings 13, Springer,
          <year>1995</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B.</given-names>
            <surname>Smyth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bernhard</surname>
          </string-name>
          ,
          <article-title>Ballot secrecy and ballot independence coincide</article-title>
          ,
          <source>in: Computer SecurityESORICS</source>
          <year>2013</year>
          : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-
          <issue>13</issue>
          ,
          <year>2013</year>
          . Proceedings 18, Springer,
          <year>2013</year>
          , pp.
          <fpage>463</fpage>
          -
          <lpage>480</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kusters</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Truderung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vogt</surname>
          </string-name>
          ,
          <article-title>Clash attacks on the verifiability of e-voting systems</article-title>
          ,
          <source>in: 2012 IEEE Symposium on Security and Privacy</source>
          , IEEE,
          <year>2012</year>
          , pp.
          <fpage>395</fpage>
          -
          <lpage>409</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <source>[15] Federal Constitutional Court of Germany. Decisions: Order of 03 March</source>
          <year>2009</year>
          - 2
          <issue>BvC 3</issue>
          /07, http://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/EN/
          <year>2009</year>
          /03/ cs20090303_2bvc000307en.html,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Cortier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Galindo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Küsters</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Müller</surname>
          </string-name>
          , T. Truderung, Sok:
          <article-title>Verifiability notions for e-voting protocols</article-title>
          ,
          <source>in: 2016 IEEE Symposium on Security and Privacy (SP)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>779</fpage>
          -
          <lpage>798</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pereira</surname>
          </string-name>
          ,
          <article-title>Internet voting with helios</article-title>
          ,
          <source>Real-World Electronic Voting: Design, Analysis and Deployment</source>
          <volume>8604</volume>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>