11th Workshop on Advances in Secure Electronic Voting

Voting

A Workshop Associated with Financial Crypto 2026
6 March 2026
St. Kitts Marriott Resort
St. Kitts

Call for Papers

Elections are fundamental to democracy and have been targeted for attacks since its inception. While the rapid, ongoing digitization introduces numerous benefits, including digital administrations and governance, digital technologies have also introduced numerous vulnerabilities in critical infrastructures relevant for democracies.

Secure voting schemes, particularly cryptographically end-to-end verifiable (E2E-V) schemes, have been extensively researched over the past twenty years. However, real-world vulnerabilities present in voting systems have heightened the scrutiny of electoral security. Further, voting schemes face challenges in achieving and maintaining properties like (E2E-)verifiability, coercion resistance, high usability, good user experience, and accountability within complex, adversarial environments.

Addressing these challenges requires a deep understanding of modern cryptography, information security, and human factors. Moreover, investigating electronic voting is interdisciplinary, demanding knowledge of governmental roles, voter behaviour, physical components, procedural methods, and legal frameworks.

Important Dates

Paper submission (extended) 18 December 2025 (AoE)
Paper notification19 January 2026 (AoE)
Discussion panel submission Rolling deadline until
25 January 2025 (AoE)

Paper Submissions

Submission website (only for Short, Full, and SoK papers):
https://easychair.org/conferences/?conf=voting26

For the discussion panel submissions email both chairs directly. See more details below.

Papers should contain original research in any area related to electronic voting technologies, verifiable elections, and related concerns. Example topics include but are not limited to:

  • In-person/on-site voting
  • Remote/Internet or hybrid voting
  • Voter registration and authentication
  • Procedures for ballot and election auditing
  • Cryptographic (or non-cryptographic) verifiable election schemes/systems
  • Attacks on existing schemes/systems
  • Designs of new schemes/systems on protocol and interface level
  • Implementations of schemes/systems or recommended improvements
  • Formal or informal security or requirements analysis
  • Investigation of human factors in electronic voting

Papers describing experiences deploying voting systems, conducting elections, or detecting and recovering from election problems are also welcome, as long as they include a rigorous analysis to constitute original research.

Submissions will be judged based on originality, relevance, correctness, and clarity.

The workshop solicits submissions of manuscripts that represent significant and novel research contributions or research ideas. Submissions must not substantially overlap with work that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Submissions should follow the Springer Lecture Notes in Computer Science format. The following types of submissions are possible:

  • Full papers: completed research, limit of 15 pages, *including* references and well-marked appendices.
  • Short papers: work in progress, novel applications and voting experiences, limit of 8 pages, including references and well-marked appendices; the title of such submissions must be preceded with the label "Short paper".
  • Systematization of Knowledge papers: limit of 15 pages, *excluding* references and well-marked appendices; the title of such submissions must be preceded with the label "SoK".

The review process will be double-blind. Submitted papers must be anonymized with no author names, affiliations, acknowledgements, or obvious references.

We allow for conditional accept papers and have a very supportive shepherding process. We anticipate 2 February as the deadline for the revision of conditional accept papers.

Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their work to journals may opt out by publishing an extended abstract only.

Discussion Panel Submissions

The workshop is also organizing a discussion panel, and we’re inviting speakers to send topics. The aim of this is to allow for a free exchange of research ideas without the constraints of the peer-review process. So, not all ideas need to be complete.

To submit for the discussion panel (email both chairs):

Karola Marky karola.marky (at) rub.de
Constantin Catalin Dragan c.dragan (at) surrey.ac.uk

The submission is an extended abstract (non-anonymous submission, 1 page for main body, and up to two pages for references). These will not appear in the LNCS proceedings. We will employ rolling deadline with a first-come, first served basis until all slots are filled. As a commitment, we require that people with selected topics to attend in-person.

Program Chairs

Karola Marky Ruhr University Bochum, Germany
Constantin Catalin Dragan University of Surrey, UK

Program Committee

Roberto Araujo Universidade Federal do Pará (UFPA)
Josh Benaloh Microsoft Research
Matthew Bernhard University of Michigan
Jurlind Budurushi Baden-Wuerttemberg Cooperative State University Karlsruhe
Jeremy Clark Concordia University
Alexander Ek Monash University
Aleksander Essex University of Wetstern Ontario
Tamara Finogina Polytechnic University of Catalonia
Kristian Gjøsteen Norwegian University of Science and Technology
Rolf Haenni Bern University of Applied Sciences
Thomas Haines Australian National University
Oksana Kulyk IT University of Copenhagen
Stephan Neumann SaarLB
Christina Frederikke Nissen IT University of Copenhagen
Olivier Pereira UCLouvain
Daniel Rausch University of Stuttgart
Peter Roenne University of Luxembourg
Peter Y. A. Ryan University of Luxembourg
Carsten Schuermann IT University of Copenhagen
Vanessa Teague Thinking Cybersecurity
Jan Willemson Cybernetica