Coercion-resistant electronic elections
Top Cited Papers
- 7 November 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 2002, 61-70
- https://doi.org/10.1145/1102199.1102213
Abstract
We introduce a model for electronic election schemes that involves a more powerful adversary than previous work. In particular, we allow the adversary to demand of coerced voters that they vote in a particular manner, abstain from voting, or even disclose their secret keys. We define a scheme to be coercion-resistant if it is infeasible for the adversary to determine if a coerced voter complies with the demands.A first contribution of this paper is to describe and characterize a new and strengthened adversary for coercion in elections. (In doing so, we additionally present what we believe to be the first formal security definitions for electronic elections of any type.) A second contribution is to demonstrate a protocol that is secure against this adversary. While it is clear that a strengthening of attack models is of theoretical relevance, it is important to note that our results lie close to practicality. This is true both in that we model real-life threats (such as vote-buying and vote-canceling), and in that our proposed protocol combines a fair degree of efficiency with an unusual lack of structural complexity. Furthermore, previous schemes have required use of an untappable channel throughout. Ours only carries the much more practical requirement of an anonymous channel during the casting of ballots, and an untappable channel during registration (potentially using postal mail).This extended abstract is a heavily truncated version of the full paper available at http://eprint.iacr.org/2002/165.Keywords
This publication has 10 references indexed in Scilit:
- Almost entirely correct mixing with applications to votingPublished by Association for Computing Machinery (ACM) ,2002
- A verifiable secret shuffle and its application to e-votingPublished by Association for Computing Machinery (ACM) ,2001
- An Efficient Scheme for Proving a ShufflePublished by Springer Nature ,2001
- Practical multi-candidate election systemPublished by Association for Computing Machinery (ACM) ,2001
- A Secure and Optimally Efficient Multi-Authority Election SchemePublished by Springer Nature ,1997
- Receipt-free secret-ballot elections (extended abstract)Published by Association for Computing Machinery (ACM) ,1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Noninteractive Zero-KnowledgeSIAM Journal on Computing, 1991
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981