11th Workshop on Advances in Secure Electronic Voting

A Workshop Associated with Financial Crypto 2026
6 March 2026
St. Kitts Marriott Resort
St. Kitts
Call for Papers
Elections are fundamental to democracy and have been targeted for attacks since its inception. While the rapid, ongoing digitization introduces numerous benefits, including digital administrations and governance, digital technologies have also introduced numerous vulnerabilities in critical infrastructures relevant for democracies.
Secure voting schemes, particularly cryptographically end-to-end verifiable (E2E-V) schemes, have been extensively researched over the past twenty years. However, real-world vulnerabilities present in voting systems have heightened the scrutiny of electoral security. Further, voting schemes face challenges in achieving and maintaining properties like (E2E-)verifiability, coercion resistance, high usability, good user experience, and accountability within complex, adversarial environments.
Addressing these challenges requires a deep understanding of modern cryptography, information security, and human factors. Moreover, investigating electronic voting is interdisciplinary, demanding knowledge of governmental roles, voter behaviour, physical components, procedural methods, and legal frameworks.
Important Dates
| Paper submission (extended) | 18 December 2025 (AoE) |
| Paper notification | 19 January 2026 (AoE) |
| Discussion panel submission | Rolling deadline until 25 January 2025 (AoE) |
Paper Submissions
Submission website (only for Short, Full, and SoK papers):
https://easychair.org/conferences/?conf=voting26
For the discussion panel submissions email both chairs directly. See more details below.
Papers should contain original research in any area related to electronic voting technologies, verifiable elections, and related concerns. Example topics include but are not limited to:
- In-person/on-site voting
- Remote/Internet or hybrid voting
- Voter registration and authentication
- Procedures for ballot and election auditing
- Cryptographic (or non-cryptographic) verifiable election schemes/systems
- Attacks on existing schemes/systems
- Designs of new schemes/systems on protocol and interface level
- Implementations of schemes/systems or recommended improvements
- Formal or informal security or requirements analysis
- Investigation of human factors in electronic voting
Papers describing experiences deploying voting systems, conducting elections, or detecting and recovering from election problems are also welcome, as long as they include a rigorous analysis to constitute original research.
Submissions will be judged based on originality, relevance, correctness, and clarity.
The workshop solicits submissions of manuscripts that represent significant and novel research contributions or research ideas. Submissions must not substantially overlap with work that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
Submissions should follow the Springer Lecture Notes in Computer Science format. The following types of submissions are possible:
- Full papers: completed research, limit of 15 pages, *including* references and well-marked appendices.
- Short papers: work in progress, novel applications and voting experiences, limit of 8 pages, including references and well-marked appendices; the title of such submissions must be preceded with the label "Short paper".
- Systematization of Knowledge papers: limit of 15 pages, *excluding* references and well-marked appendices; the title of such submissions must be preceded with the label "SoK".
The review process will be double-blind. Submitted papers must be anonymized with no author names, affiliations, acknowledgements, or obvious references.
We allow for conditional accept papers and have a very supportive shepherding process. We anticipate 2 February as the deadline for the revision of conditional accept papers.
Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their work to journals may opt out by publishing an extended abstract only.
Discussion Panel Submissions
The workshop is also organizing a discussion panel, and we’re inviting speakers to send topics. The aim of this is to allow for a free exchange of research ideas without the constraints of the peer-review process. So, not all ideas need to be complete.
To submit for the discussion panel (email both chairs):
| Karola Marky | karola.marky (at) rub.de |
| Constantin Catalin Dragan | c.dragan (at) surrey.ac.uk |
The submission is an extended abstract (non-anonymous submission, 1 page for main body, and up to two pages for references). These will not appear in the LNCS proceedings. We will employ rolling deadline with a first-come, first served basis until all slots are filled. As a commitment, we require that people with selected topics to attend in-person.
Program Chairs
| Karola Marky | Ruhr University Bochum, Germany |
| Constantin Catalin Dragan | University of Surrey, UK |
Program Committee
| Roberto Araujo | Universidade Federal do Pará (UFPA) |
| Josh Benaloh | Microsoft Research |
| Matthew Bernhard | University of Michigan |
| Jurlind Budurushi | Baden-Wuerttemberg Cooperative State University Karlsruhe |
| Jeremy Clark | Concordia University |
| Alexander Ek | Monash University |
| Aleksander Essex | University of Wetstern Ontario |
| Tamara Finogina | Polytechnic University of Catalonia |
| Kristian Gjøsteen | Norwegian University of Science and Technology |
| Rolf Haenni | Bern University of Applied Sciences |
| Thomas Haines | Australian National University |
| Oksana Kulyk | IT University of Copenhagen |
| Stephan Neumann | SaarLB |
| Christina Frederikke Nissen | IT University of Copenhagen |
| Olivier Pereira | UCLouvain |
| Daniel Rausch | University of Stuttgart |
| Peter Roenne | University of Luxembourg |
| Peter Y. A. Ryan | University of Luxembourg |
| Carsten Schuermann | IT University of Copenhagen |
| Vanessa Teague | Thinking Cybersecurity |
| Jan Willemson | Cybernetica |