Back to Search
Start Over
Risk-Limiting Tallies
- Source :
- Electronic Voting ISBN: 9783030306243, E-VOTE-ID
- Publication Year :
- 2020
- Publisher :
- Zenodo, 2020.
-
Abstract
- Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one candidate then all vote privacy evaporates. The mere possibility of candidates getting no or few votes could have implications for security in practice: if a coercer demands that a voter cast a vote for such an unpopular candidate, then the voter may feel obliged to obey, even if she is confident that the voting system satisfies the standard coercion resistance definitions. With complex ballots, there may also be a danger of “Italian” style (aka “signature”) attacks: the coercer demands the voter cast a ballot with a specific, identifying pattern. Here we propose an approach to tallying end-to-end verifiable schemes that avoids revealing all the votes but still achieves whatever confidence level in the announced result is desired. Now a coerced voter can claim that the required vote must be amongst those that remained shrouded. Our approach is based on the well-established notion of Risk-Limiting Audits, but here applied to the tally rather than to the audit. We show that this approach counters coercion threats arising in extreme tallies and “Italian” attacks. We illustrate our approach by applying it to the Selene scheme, and we extend the approach to Risk-Limiting Verification, where not all vote trackers are revealed, thereby enhancing the coercion mitigation properties of Selene.
- Subjects :
- FOS: Computer and information sciences
Computer Science - Cryptography and Security
Risk-limiting audits
Goto
Computer science
media_common.quotation_subject
0102 computer and information sciences
02 engineering and technology
Plausible deniability
Computer security
computer.software_genre
01 natural sciences
Statistics - Applications
Computer Science - Computers and Society
Voting
Computers and Society (cs.CY)
0202 electrical engineering, electronic engineering, information engineering
Applications (stat.AP)
AKA
media_common
Coercion resistance
Limiting
16. Peace & justice
Ballot
010201 computation theory & mathematics
020201 artificial intelligence & image processing
End-to-end verifiability
computer
Cryptography and Security (cs.CR)
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-030-30624-3
- ISBNs :
- 9783030306243
- Database :
- OpenAIRE
- Journal :
- Electronic Voting ISBN: 9783030306243, E-VOTE-ID
- Accession number :
- edsair.doi.dedup.....8cf947532ace1871090faf4c793c5306
- Full Text :
- https://doi.org/10.5281/zenodo.3952218