2017
DOI: 10.1007/978-3-319-52240-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Coercion in E-Voting: Be Open and Commit

Abstract: We present a game-theoretic approach to coercion-resistance from the point of view of an honest election authority that chooses between various protection methods with different levels of resistance and different implementation costs. We give a simple game model of the election and propose a preliminary analysis. It turns out that, in the games that we look at, Stackelberg equilibrium for the society does not coincide with maxmin, and it is always more attractive to the society than Nash equilibrium. This sugg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 27 publications
(24 reference statements)
0
2
0
Order By: Relevance
“…In [5], two voting systems were compared using zero-sum two-player games based on attack trees, with the payoffs representing the success of coercion. In [12], a simple game-theoretic model of preventing coercion was proposed and analyzed using Nash equilibrium, maxmin, and Stackelberg equilibrium. The authors of [22] applied Stackelberg games to prevent manipulation of elections, focussing on the computational complexity of preventing Denial of Service attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In [5], two voting systems were compared using zero-sum two-player games based on attack trees, with the payoffs representing the success of coercion. In [12], a simple game-theoretic model of preventing coercion was proposed and analyzed using Nash equilibrium, maxmin, and Stackelberg equilibrium. The authors of [22] applied Stackelberg games to prevent manipulation of elections, focussing on the computational complexity of preventing Denial of Service attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, to our best knowledge, the idea of measuring the security level by the complexity of strategies needed to preserve a given security requirement is entirely new. Other (somewhat) related works include social-technical modeling of attacks with timed automata [15] and especially game-theoretic analysis of voting procedures [9,14,2,23]. Also, strategies for human users to obtain simple security requirements were investigated in [3].…”
Section: Introductionmentioning
confidence: 99%
“…In [5], two voting systems were compared using zero-sum two-player games based on attack trees, with the payoffs representing the success of coercion. In [13], a simple game-theoretic model of preventing coercion was proposed and analyzed using Nash equilibrium, maxmin, and Stackelberg equilibrium. The authors of [25] applied Stackelberg games to prevent manipulation of elections, focussing on the computational complexity of preventing Denial of Service attacks.…”
Section: Introductionmentioning
confidence: 99%