At the heart of our mission is distributing the work that we do in forms that can be understood and built on by others. In this section you will find academically-oriented reports, papers and write ups that Open Privacy and/or our staff members have contributed to.

How Not To Prove Your Election Outcome
2020 May 18A full analysis of the critical cryptographic vulnerabilities present in the Scytl/SwissPost e-voting solution to be presented at 41st IEEE Symposium on Security and Privacy.

Token Based Services - Differences from Privacy Pass
OPTR2019-012019 December 12
An approach to allow anonymous peers to (pre-)purchase services from anonymous servers based on Privacy Pass

Addendum to How not to prove your election outcome
2019 March 29The use of non-adaptive zero knowledge proofs in theScytl-SwissPost Internet voting system, and its implications for decryption proof soundness

How not to prove your election outcome
2019 March 25The use of non-adaptive zero knowledge proofs in theScytl-SwissPost Internet voting system, and its implications for decryption proof soundness

Ceci n’est pas une preuve
2019 March 12The use of trapdoor commitments in Bayer-Groth proofsand the implications for the verifiabilty of the Scytl-SwissPost Internet voting system