{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T22:34:01Z","timestamp":1771799641930,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031159107","type":"print"},{"value":"9783031159114","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:00:00Z","timestamp":1662163200000},"content-version":"vor","delay-in-days":245,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This article provides the first security and privacy analysis of the Neovote voting system, which was used for three of the five primaries in the French 2022 presidential election. We show that the demands of transparency, verifiability and security set by French governmental organisations were not met, and propose multiple attacks against the system targeting both the breach of voters\u2019 privacy and the manipulation of the tally. We also show how inconsistencies in the verification system allow the publication of erroneous tallies and document how this arrived in practice during one of the primary elections.\n<\/jats:p>","DOI":"10.1007\/978-3-031-15911-4_1","type":"book-chapter","created":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T14:04:29Z","timestamp":1662127469000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Analysis of\u00a0the\u00a0Security and\u00a0Privacy Issues of\u00a0the\u00a0Neovote Online Voting System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1511-8864","authenticated-orcid":false,"given":"Enka","family":"Blanchard","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9457-7112","authenticated-orcid":false,"given":"Antoine","family":"Gallais","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Leblond","sequence":"additional","affiliation":[]},{"given":"Djohar","family":"Sidhoum-Rahal","sequence":"additional","affiliation":[]},{"given":"Juliette","family":"Walter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,3]]},"reference":[{"key":"1_CR1","unstructured":"Guide de s\u00e9lection d\u2019algorithmes cryptographiques: Technical report, Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (2021)"},{"key":"1_CR2","unstructured":"Ali, S.T., Murray, J.: An overview of end-to-end verifiable voting systems. In: Real-World Electronic Voting, pp. 189\u2013234 (2016)"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3917\/comm.154.0413","volume":"2","author":"M Balinski","year":"2016","unstructured":"Balinski, M., Laraki, R.: Instaurons le \u00abjugement majoritaire\u00bb. Commentaire 2, 413\u2013415 (2016)","journal-title":"Commentaire"},{"key":"1_CR4","unstructured":"Barrett, R.W.: Elephant in the boardroom: counting the vote in corporate elections. Valparaiso University Law Rev. 44, 125 (2009)"},{"key":"1_CR5","unstructured":"de Barros, F., Gergouil, T., Grelard, R., Thibault, S.: Analyse de syst\u00e8mes de vote \u00e9lectronique. Master\u2019s thesis, Universit\u00e9 de Bordeaux, February 2022"},{"key":"1_CR6","unstructured":"Blanchard, E.: Usability: low tech, high security. Ph.D. thesis, Institut de Recherche en Informatique Fondamentale, Universit\u00e9 Sorbonne Paris Cit\u00e9 (2019)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Blanchard, E., Robucci, R., Selker, T., Sherman, A.T.: Phrase-verified voting: verifiable low-tech remote boardroom voting: how we voted on tenure & promotion cases during the pandemic. Cryptologia 46, 1\u201335 (2021)","DOI":"10.1080\/01611194.2021.1975324"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11745853_1","volume-title":"Public Key Cryptography - PKC 2006","author":"D Bleichenbacher","year":"2006","unstructured":"Bleichenbacher, D., May, A.: New attacks on RSA with small secret CRT-exponents. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 1\u201313. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_1"},{"key":"1_CR9","unstructured":"CNIL: D\u00e9lib\u00e9ration n$$^\\circ $$2019-053 du 25 avril 2019 portant adoption d\u2019une recommandation relative \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes de vote par correspondance \u00e9lectronique, notamment via internet. Technical report, JORF (2019)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-19052-1_14","volume-title":"Foundations of Security, Protocols, and Equational Reasoning","author":"V Cortier","year":"2019","unstructured":"Cortier, V., Gaudry, P., Glondu, S.: Belenios: a simple private and verifiable electronic voting system. In: Guttman, J.D., Landwehr, C.E., Meseguer, J., Pavlovic, D. (eds.) Foundations of Security, Protocols, and Equational Reasoning. LNCS, vol. 11565, pp. 214\u2013238. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-19052-1_14"},{"key":"1_CR11","unstructured":"Cour Administrative d\u2019Appel de Marseille, 5\u00e8me chambre: D\u00e9cision n$$^\\circ $$19ma03754 du, 16 December 2019"},{"key":"1_CR12","unstructured":"Cour de cassation civil, Chambre sociale: D\u00e9cision n$$^\\circ $$20-17.073 du, 24 November 2021"},{"issue":"4","key":"1_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.4000\/cdst.326","volume":"4","author":"C Enguehard","year":"2014","unstructured":"Enguehard, C., Graton, J.D.: Machines \u00e0 voter et \u00e9lections politiques en France: \u00e9tude quantitative de la pr\u00e9cision des bureaux de vote. Cahiers Droit Sci. Technol. 4(4), 159\u2013198 (2014)","journal-title":"Cahiers Droit Sci. Technol."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Frye, T., Reuter, O.J., Szakonyi, D.: Hitting them with carrots: voter intimidation and vote buying in Russia. Br. J. Polit. Sci. 49, 1\u201325 (2018)","DOI":"10.1017\/S0007123416000752"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-27809-2_10","volume-title":"Financial Cryptography","author":"J Groth","year":"2004","unstructured":"Groth, J.: Efficient maximal privacy in boardroom voting and anonymous broadcast. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 90\u2013104. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27809-2_10"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-60347-2_7","volume-title":"Electronic Voting","author":"R Haenni","year":"2020","unstructured":"Haenni, R., Dubuis, E., Koenig, R.E., Locher, P.: CHVote: sixteen best practices and\u00a0lessons learned. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 95\u2013111. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60347-2_7"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-662-63958-0_24","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops","author":"T Haines","year":"2021","unstructured":"Haines, T., Roenne, P.: New standards for E-voting systems: reflections on source code examinations. In: Bernhard, M., et al. (eds.) FC 2021. LNCS, vol. 12676, pp. 279\u2013289. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_24"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.electstud.2015.11.004","volume":"41","author":"CJ Harvey","year":"2016","unstructured":"Harvey, C.J.: Changes in the menu of manipulation: electoral fraud, ballot stuffing, and voter pressure in the 2011 Russian election. Elect. Stud. 41, 105\u2013117 (2016)","journal-title":"Elect. Stud."},{"key":"1_CR19","unstructured":"Horn, A.: Le vote en ligne de la primaire populaire est-il s\u00e9curis\u00e9? Numerama (2022)"},{"key":"1_CR20","first-page":"247","volume":"18","author":"DA Horwitz","year":"2015","unstructured":"Horwitz, D.A.: A picture\u2019s worth a thousand words: why ballot selfies are protected by the first amendment. SMU Sci. Technol. Law Rev. 18, 247 (2015)","journal-title":"SMU Sci. Technol. Law Rev."},{"issue":"8","key":"1_CR21","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2018.3191268","volume":"51","author":"J Isaak","year":"2018","unstructured":"Isaak, J., Hanna, M.J.: User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer 51(8), 56\u201359 (2018)","journal-title":"Computer"},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"237","DOI":"10.2307\/4048131","volume":"10","author":"BL Kinzer","year":"1978","unstructured":"Kinzer, B.L.: The Un-Englishness of the secret ballot. Albion 10(3), 237\u2013256 (1978)","journal-title":"Albion"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Accountability: definition and relationship to verifiability. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 526\u2013535 (2010)","DOI":"10.1145\/1866307.1866366"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3917\/pouv.154.0099","volume":"3","author":"A Levade","year":"2015","unstructured":"Levade, A.: Le droit des primaires: r\u00e8gles, contr\u00f4le, finances, sanctions. Pouvoirs 3, 99\u2013109 (2015)","journal-title":"Pouvoirs"},{"issue":"1","key":"1_CR25","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/0025570X.2001.11953030","volume":"74","author":"BH Margolius","year":"2001","unstructured":"Margolius, B.H.: Avoiding your spouse at a bridge party. Math. Mag. 74(1), 33\u201341 (2001)","journal-title":"Math. Mag."},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-70972-7_20","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2017","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Kiayias, A. (ed.) Financial Cryptography and Data Security, pp. 357\u2013375. Springer International Publishing, Cham (2017)"},{"key":"1_CR27","unstructured":"McKenna, M.: Building \u201ca closet of prayer\u201d in the new world: the story of the \u201cAustralian ballot\u201d. Menzies Centre for Australian Studies (2001)"},{"issue":"1","key":"1_CR28","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/S0165-1765(00)00332-3","volume":"70","author":"PJ Reny","year":"2001","unstructured":"Reny, P.J.: Arrow\u2019s theorem and the Gibbard-Satterthwaite theorem: a unified approach. Econ. Lett. 70(1), 99\u2013105 (2001)","journal-title":"Econ. Lett."},{"key":"1_CR29","unstructured":"Souffi, E.: La primaire \u00e9cologiste, vote chez les R\u00e9publicains... Neovote, l\u2019entreprise championne des scrutins virtuels. Le Journal du Dimanche (2021)"},{"key":"1_CR30","unstructured":"Vasseur, V.: Primaire \u00e9colo, congr\u00e8s LR: dans les entrailles de Neovote, sp\u00e9cialiste du vote \u00e9lectronique. France Inter (2021)"},{"key":"1_CR31","unstructured":"Vinkel, P.: Remote Electronic Voting in Estonia: Legality, Impact and Confidence. TUT Press (2015)"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Spycher, O., Dubuis, E.: Measures to establish trust in internet voting. In: Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, pp. 1\u201310 (2011)","DOI":"10.1145\/2072069.2072071"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15911-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T23:03:04Z","timestamp":1664233384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15911-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031159107","9783031159114"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15911-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bregenz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}