10th Workshop on Advances in Secure Electronic Voting

Voting

A Workshop Associated with Financial Crypto 2025
April 18, 2025
Hotel Shigira Mirage
Miyakojima, Japan

Call for Papers

Elections are fundamental to democracy and have been targeted for attacks since its inception. While the rapid, ongoing digitization introduces numerous benefits, including digital administrations and governance, digital technologies have also introduced numerous vulnerabilities in critical infrastructures relevant for democracies.

Secure voting schemes, particularly cryptographically end-to-end verifiable (E2E-V) schemes, have been extensively researched over the past twenty years. However, real-world vulnerabilities present in voting systems have heightened the scrutiny of electoral security. Further, voting schemes face challenges in achieving and maintaining properties like (E2E-)verifiability, coercion resistance, high usability, good user experience, and accountability within complex, adversarial environments.

Addressing these challenges requires a deep understanding of modern cryptography, information security, and human factors. Moreover, investigating electronic voting is interdisciplinary, demanding knowledge of governmental roles, voter behaviour, physical components, procedural methods, and legal frameworks.

Important Dates

Initial Submission (title and abstract) DeadlineJanuary 19th, 2025 (AoE)
Full Submission DeadlineJanuary 26th, 2025 (AoE)
Notification of acceptanceMarch 2nd, 2025 (AoE)

Submissions

Papers should contain original research in any area related to electronic voting technologies, verifiable elections, and related concerns. Example topics include but are not limited to:

  • In-person/on-site voting
  • Remote/Internet or hybrid voting
  • Voter registration and authentication
  • Procedures for ballot and election auditing
  • Cryptographic (or non-cryptographic) verifiable election schemes/systems
  • Attacks on existing schemes/systems
  • Designs of new schemes/systems on protocol and interface level
  • Implementations of schemes/systems or recommended improvements
  • Formal or informal security or requirements analysis
  • Investigation of human factors in electronic voting

Papers describing experiences deploying voting systems, conducting elections, or detecting and recovering from election problems are also welcome, as long as they include a rigorous analysis to constitute original research.

Submissions will be judged based on originality, relevance, correctness, and clarity.

The workshop solicits submissions of manuscripts that represent significant and novel research contributions. Submissions must not substantially overlap with work that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Submissions should follow the Springer Lecture Notes in Computer Science format. The following types of submissions are possible:

  • Full papers: completed research, limit of 15 pages, *including* references and well-marked appendices
  • Short papers: work in progress, novel applications and voting experiences, limit of 8 pages, including references and well-marked appendices; the title of such submissions must be preceded with the label "Short paper"
  • Systematization of Knowledge papers: limit of 15 pages, *excluding* references and well-marked appendices; the title of such submissions must be preceded with the label "SoK"

The review process will be double-blind. Submitted papers must be anonymized with no author names, affiliations, acknowledgements, or obvious references.

Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their work to journals may opt out by publishing an extended abstract only.

Submission website

Submit your paper manuscript in EasyChair here:
https://easychair.org/conferences/?conf=voting25

Program Chairs

Jurlind BudurushiBaden-Wuerttemberg Cooperative State University Karlsruhe, Germany
Karola MarkyRuhr University Bochum, Germany

Program Committee

Roberto Araujo Universidade Federal do Pará (UFPA)
Josh Benaloh Microsoft Research
Matthew Bernhard University of Michigan
Michelle Blom The University of Melbourne
Jurlind Budurushi Baden-Wuerttemberg Cooperative State University Karlsruhe
Jeremy Clark Concordia University
Costantin Catalin Dragan University of Surrey
Aleksander Ek Monash University
Aleksander Essex University of Wetstern Ontario
Tamara Finogina Polytechnic University of Catalonia
Kristian Gjøsteen Norwegian University of Science and Technology
Rolf Haenni Bern University of Applied Sciences
Thomas Heines Australian National University
Wojciech Jamroga Polish Academy of Sciences
Oksana Kulyk IT University of Copenhagen
Karola Marky Ruhr University Bochum
Johannes Mueller Inria
Stephan Neumann SaarLB
Christina Frederikke Nissen IT University of Copenhagen
Olivier Pereira UCLouvain
Daniel Rausch University of Stuttgart
Pascal Reisert University of Stuttgart
Peter Roenne University of Luxembourg
Peter Y. A. Ryan University of Luxembourg
Carsten Schuermann IT University of Copenhagen
Philip Stark University of California, Berkeley
Vanessa Teague Thinking Cybersecurity
Jan Willemson Cybernetica