Thwarting Last-Minute Voter Coercion

被引:0
作者
Giustolisi, Rosario [1 ]
Garjan, Maryam Sheikhi [1 ]
Schuermann, Carsten [1 ]
机构
[1] IT Univ Copenhagen, Copenhagen, Denmark
来源
45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024 | 2024年
关键词
SECURE; PRIVACY;
D O I
10.1109/SP54263.2024.00112
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submit votes that represent their own intentions in an environment controlled by a coercer. By deploying a counter-strategy a voter can prevent the coercer from learning if the voter followed the coercer's instructions or not. Two effective counter-strategies have been proposed in the literature, one based on fake credentials and another on revoting. While fake-credential schemes assume that voters hide cryptographic keys away from the coercer, revoting schemes assume that voters can revote after being coerced. In this work, we present a new counter-strategy technique that enables flexible vote updating, that is, a revoting approach that provides protection against coercion even if the adversary is able to coerce a voter at the very last minute of the voting phase. We demonstrate that our technique is effective by implementing it in Loki, an Internet-based coercion-resistant voting scheme that allows revoting. We prove that Loki satisfies a game-based definition of coercion-resistance that accounts for flexible vote updating. To the best of our knowledge, we provide the first technique that enables deniable coercionresistant voting and that can evade last-minute voter coercion.
引用
收藏
页码:3423 / 3439
页数:17
相关论文
共 46 条
[1]  
Achenbach D., 2015, USENIX Journal of Election Technology and Systems
[2]  
[Anonymous], 2012, 2012 EL VOT TECHN WO
[3]  
[Anonymous], 1996, THESIS
[4]  
Araujo R., 2010, PRACTICAL SECURE COE, P330, DOI [10.1007/978- 3- 642- 12980-3 20, DOI 10.1007/978-3-642-12980-3_20]
[5]  
Benaloh J., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P544, DOI 10.1145/195058.195407
[6]   Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme [J].
Bernhard, David ;
Kulyk, Oksana ;
Volkamer, Melanie .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[7]   SoK: A comprehensive analysis of game-based ballot privacy definitions [J].
Bernhard, David ;
Cortier, Veronique ;
Galindo, David ;
Pereira, Olivier ;
Warinschi, Bogdan .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :499-516
[8]  
Bernhard D, 2012, LECT NOTES COMPUT SC, V7658, P626, DOI 10.1007/978-3-642-34961-4_38
[9]   Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting [J].
Boyen, Xavier ;
Haines, Thomas ;
Mueller, Johannes .
2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, :272-291
[10]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565