10th Workshop on Advances in Secure Electronic Voting
A Workshop Associated with Financial Crypto 2025
April 18, 2025
Hotel Shigira Mirage
Miyakojima, Japan
Call for Papers
Elections are fundamental to democracy and have been targeted for attacks since its inception. While the rapid, ongoing digitization introduces numerous benefits, including digital administrations and governance, digital technologies have also introduced numerous vulnerabilities in critical infrastructures relevant for democracies.
Secure voting schemes, particularly cryptographically end-to-end verifiable (E2E-V) schemes, have been extensively researched over the past twenty years. However, real-world vulnerabilities present in voting systems have heightened the scrutiny of electoral security. Further, voting schemes face challenges in achieving and maintaining properties like (E2E-)verifiability, coercion resistance, high usability, good user experience, and accountability within complex, adversarial environments.
Addressing these challenges requires a deep understanding of modern cryptography, information security, and human factors. Moreover, investigating electronic voting is interdisciplinary, demanding knowledge of governmental roles, voter behaviour, physical components, procedural methods, and legal frameworks.
Important Dates
Initial Submission (title and abstract) Deadline | January 19th, 2025 (AoE) |
Full Submission Deadline | January 26th, 2025 (AoE) |
Notification of acceptance | March 2nd, 2025 (AoE) |
Submissions
Papers should contain original research in any area related to electronic voting technologies, verifiable elections, and related concerns. Example topics include but are not limited to:
- In-person/on-site voting
- Remote/Internet or hybrid voting
- Voter registration and authentication
- Procedures for ballot and election auditing
- Cryptographic (or non-cryptographic) verifiable election schemes/systems
- Attacks on existing schemes/systems
- Designs of new schemes/systems on protocol and interface level
- Implementations of schemes/systems or recommended improvements
- Formal or informal security or requirements analysis
- Investigation of human factors in electronic voting
Papers describing experiences deploying voting systems, conducting elections, or detecting and recovering from election problems are also welcome, as long as they include a rigorous analysis to constitute original research.
Submissions will be judged based on originality, relevance, correctness, and clarity.
The workshop solicits submissions of manuscripts that represent significant and novel research contributions. Submissions must not substantially overlap with work that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
Submissions should follow the Springer Lecture Notes in Computer Science format. The following types of submissions are possible:
- Full papers: completed research, limit of 15 pages, *including* references and well-marked appendices
- Short papers: work in progress, novel applications and voting experiences, limit of 8 pages, including references and well-marked appendices; the title of such submissions must be preceded with the label "Short paper"
- Systematization of Knowledge papers: limit of 15 pages, *excluding* references and well-marked appendices; the title of such submissions must be preceded with the label "SoK"
The review process will be double-blind. Submitted papers must be anonymized with no author names, affiliations, acknowledgements, or obvious references.
Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their work to journals may opt out by publishing an extended abstract only.
Submission website
Submit your paper manuscript in EasyChair here:https://easychair.org/conferences/?conf=voting25
Program Chairs
Jurlind Budurushi | Baden-Wuerttemberg Cooperative State University Karlsruhe, Germany |
Karola Marky | Ruhr University Bochum, Germany |
Program Committee
Roberto Araujo | Universidade Federal do Pará (UFPA) |
Josh Benaloh | Microsoft Research |
Matthew Bernhard | University of Michigan |
Michelle Blom | The University of Melbourne |
Jurlind Budurushi | Baden-Wuerttemberg Cooperative State University Karlsruhe |
Jeremy Clark | Concordia University |
Costantin Catalin Dragan | University of Surrey |
Aleksander Ek | Monash University |
Aleksander Essex | University of Wetstern Ontario |
Tamara Finogina | Polytechnic University of Catalonia |
Kristian Gjøsteen | Norwegian University of Science and Technology |
Rolf Haenni | Bern University of Applied Sciences |
Thomas Heines | Australian National University |
Wojciech Jamroga | Polish Academy of Sciences |
Oksana Kulyk | IT University of Copenhagen |
Karola Marky | Ruhr University Bochum |
Johannes Mueller | Inria |
Stephan Neumann | SaarLB |
Christina Frederikke Nissen | IT University of Copenhagen |
Olivier Pereira | UCLouvain |
Daniel Rausch | University of Stuttgart |
Pascal Reisert | University of Stuttgart |
Peter Roenne | University of Luxembourg |
Peter Y. A. Ryan | University of Luxembourg |
Carsten Schuermann | IT University of Copenhagen |
Philip Stark | University of California, Berkeley |
Vanessa Teague | Thinking Cybersecurity |
Jan Willemson | Cybernetica |