Thomas Haines

Orcid: 0000-0003-4954-5629

According to our database1, Thomas Haines authored at least 44 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Formalisation of the KZG Polynomial Commitment Schemes in EasyCrypt.
Proceedings of the Computer Security - ESORICS 2025, 2025

Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

2024
Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System.
Proceedings of the 33rd USENIX Security Symposium, 2024

On the Applicability of STARKs to Counted-as-Collected Verification in Existing Homomorphic E-Voting Systems.
Proceedings of the Financial Cryptography and Data Security. FC 2024 International Workshops, 2024

2023
SoK: Secure E-Voting with Everlasting Privacy.
Proc. Priv. Enhancing Technol., January, 2023

Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth.
Proceedings of the 32nd USENIX Security Symposium, 2023

Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

On the Auditability of the Estonian IVXV System - And an Attack on Individual Verifiability.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study.
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023

Machine-Checked Proofs of Accountability: How to sElect Who is to Blame.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System.
CoRR, 2022

Running the Race: A Swiss Voting Story.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Verifiable Decryption in the Head.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Improved Verifiability for BeleniosVS.
IACR Cryptol. ePrint Arch., 2021

Towards Verifiable Remote Voting with Paper Assurance.
CoRR, 2021

Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

New Standards for E-Voting Systems: Reflections on Source Code Examinations.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Optimal Randomized Partial Checking for Decryption Mix Nets.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
How not to prove your election outcome.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Machine-Checking the Universal Verifiability of ElectionGuard.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities.
Proceedings of the Financial Cryptography and Data Security, 2020

Vote Selling Resistant Voting.
Proceedings of the Financial Cryptography and Data Security, 2020

Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing.
Proceedings of the Computer Security - ESORICS 2020, 2020

SoK: Techniques for Verifiable Mix Nets.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
A Description and Proof of a Generalised and Optimised Variant of Wikström's Mixnet.
CoRR, 2019

Verifiable Homomorphic Tallying for the Schulze Vote Counting Scheme.
Proceedings of the Verified Software. Theories, Tools, and Experiments, 2019

Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Cronus: Everlasting Privacy with Audit and Cast.
Proceedings of the Secure IT Systems, 2019

A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Verified Verifiers for Verifying Elections.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Forward-Secure Linkable Ring Signatures from Bilinear Maps.
Cryptogr., 2018

Graphchain: a Blockchain-Free Scalable Decentralised Ledger.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

ITADS: A Real-World Intelligent Tutor to Train Troubleshooting Skills.
Proceedings of the Artificial Intelligence in Education - 19th International Conference, 2018

Forward-Secure Linkable Ring Signatures.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Bitcoin Unchained.
ERCIM News, 2017

2016
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions.
IACR Cryptol. ePrint Arch., 2016

Truly Multi-authority 'Prêt-à-Voter'.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

Key Recovery: Inert and Public.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

VOTOR: conceptually simple remote voting against tiny tyrants.
Proceedings of the Australasian Computer Science Week Multiconference, 2016


  Loading...