Coercion Resistant End-to-end Voting

  • Authors:
  • Ryan W. Gardner;Sujata Garera;Aviel D. Rubin

  • Affiliations:
  • Johns Hopkins University, Baltimore, USA 21218;Johns Hopkins University, Baltimore, USA 21218;Johns Hopkins University, Baltimore, USA 21218

  • Venue:
  • Financial Cryptography and Data Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been considered only when voting devices are honest, and in many schemes, voters can be forced or incentivized to cast votes of an adversary's choice. In this paper, we examine the issue of voter coercion and identify one example method for coercing voters in a scheme by Benaloh. To address such attacks, we present a formal definition of coercion resistance for end-to-end voting. We then present a new scheme, extended from Benaloh's, that is provably coercion resistant. In addition to providing accuracy and coercion resistance, our scheme emphasizes ease-of-use for the voter.