2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.32
|View full text |Cite
|
Sign up to set email alerts
|

Caveat Coercitor: Coercion-Evidence in Electronic Voting

Abstract: The balance between coercion-resistance, election verifiability and usability remains unresolved in remote electronic voting despite significant research over the last few years. We propose a change of perspective, replacing the requirement of coercion-resistance with a new requirement of coercionevidence: there should be public evidence of the amount of coercion that has taken place during a particular execution of the voting system. We provide a formal definition of coercion-evidence that has two parts. Firs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(37 citation statements)
references
References 19 publications
(23 reference statements)
0
36
0
Order By: Relevance
“…Moreover, we would like to include new cryptographic primitives such as XOR, blind signature and re-encryption used in very interesting protocols e.g. Caveat Coercitor [11].…”
Section: Fig 1 Experimental Resultsmentioning
confidence: 99%
“…Moreover, we would like to include new cryptographic primitives such as XOR, blind signature and re-encryption used in very interesting protocols e.g. Caveat Coercitor [11].…”
Section: Fig 1 Experimental Resultsmentioning
confidence: 99%
“…This process includes following buyers' instructions and communicating with buyers during the voting process [25]. Traditionally, vote-selling is considered illegal and is prohibited in elections.…”
Section: Vote-selling Resistancementioning
confidence: 99%
“…Instead of considering voter-coercion resistance, Caveat Coercitor [25] proposed a protocol which satisfies coercion-evidence. Unlike voter-coercion resistant systems, Caveat Coercitor tolerates coercions but records unforgeable evidence for voter-coercions.…”
Section: Caveat Coercitor [25]mentioning
confidence: 99%
“…Formal methods have proved to be effective in highlighting weaknesses of protocols and hence enabling designers and programmers to patch them and strengthen their security guarantees, as well as in giving strong assurance on the properties a protocol achieves by proving the absence of attacks undermining the stated security properties. For example, conference management [1], electronic voting [2][3][4], single-sign-on [5,6], cloud storage [7], RFID [8], TPM [9,10] and mobile telephony protocols [11] have been scrutinized using manual and automatic verification techniques. Manual proof methods are lengthy and error prone, while automatic verification tools have to compromise in order to achieve decidability (at least for some subclass of processes) by bounding the number of agents and sessions and/or restricting the considered class of cryptographic functions.…”
Section: Introductionmentioning
confidence: 99%