Thwarting Last-Minute Voter Coercion

被引:0
作者
Giustolisi, Rosario [1 ]
Garjan, Maryam Sheikhi [1 ]
Schuermann, Carsten [1 ]
机构
[1] IT Univ Copenhagen, Copenhagen, Denmark
来源
45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024 | 2024年
关键词
SECURE; PRIVACY;
D O I
10.1109/SP54263.2024.00112
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Counter-strategies are key components of coercion-resistant voting schemes, allowing voters to submit votes that represent their own intentions in an environment controlled by a coercer. By deploying a counter-strategy a voter can prevent the coercer from learning if the voter followed the coercer's instructions or not. Two effective counter-strategies have been proposed in the literature, one based on fake credentials and another on revoting. While fake-credential schemes assume that voters hide cryptographic keys away from the coercer, revoting schemes assume that voters can revote after being coerced. In this work, we present a new counter-strategy technique that enables flexible vote updating, that is, a revoting approach that provides protection against coercion even if the adversary is able to coerce a voter at the very last minute of the voting phase. We demonstrate that our technique is effective by implementing it in Loki, an Internet-based coercion-resistant voting scheme that allows revoting. We prove that Loki satisfies a game-based definition of coercion-resistance that accounts for flexible vote updating. To the best of our knowledge, we provide the first technique that enables deniable coercionresistant voting and that can evade last-minute voter coercion.
引用
收藏
页码:3423 / 3439
页数:17
相关论文
共 46 条
[31]   Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking [J].
Kuesters, Ralf ;
Truderung, Tomasz ;
Vogt, Andreas .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :343-358
[32]   A game-based definition of coercion resistance and its applications [J].
Kuesters, Ralf ;
Truderung, Tomasz ;
Vogt, Andreas .
JOURNAL OF COMPUTER SECURITY, 2012, 20 (06) :709-764
[33]   Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study [J].
Kuesters, Ralf ;
Truderung, Tomasz ;
Vogt, Andreas .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :538-553
[34]   A Game-Based Definition of Coercion-Resistance and its Applications [J].
Kuesters, Ralf ;
Truderung, Tomasz ;
Vogt, Andreas .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :122-136
[35]   An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols [J].
Kuesters, Ralf ;
Truderung, Tomasz .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :251-266
[36]   Extending Helios Towards Private Eligibility Verifiability [J].
Kulyk, Oksana ;
Teague, Vanessa ;
Volkamer, Melanie .
E-VOTING AND IDENTITY, VOTEID 2015, 2015, 9269 :57-73
[37]  
Kutylowski M, 2007, LECT NOTES COMPUT SC, V4752, P199
[38]  
Liedtke J., 2020, IEEE 5 EUR S SEC PRI
[39]  
Lueks W, 2019, PROCEEDINGS OF THE 18TH ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2019, P50, DOI 10.1145/3338498.3358653
[40]  
Lueks W, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1553