A threat analysis of prêt à voter

  • Authors:
  • Peter Y. A. Ryan;Thea Peacock

  • Affiliations:
  • Department of Computing Science and Communications, University of Luxembourg 6, Luxembourg;School of Computing Science, University of Newcastle, Newcastle upon Tyne, United Kingdom

  • Venue:
  • Towards Trustworthy Elections
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

It is widely recognised that the security of even the best-designed technical systems can be undermined by socio-technical weaknesses that stem from implementation flaws, environmental factors that violate (often implicit) assumptions and human fallibility. This is especially true of cryptographic voting systems, which typically have a large user base and are used infrequently. In the spirit of the this observation, Karlof et al [11] have performed an analysis of the Chaum [5] and Neff [18] schemes from the “systems perspective”. By stepping outside the purely technical, protocol specifications, they identify a number of potential vulnerabilities of these schemes. In this paper, we perform a similar analysis of the Prêt à Voter [6]. Firstly, we examine the extent to which the vulnerabilities identified in [11] apply to Prêt à Voter. We then describe some further vulnerabilities and threats not identified in [11]. Some of these, such as chain-voting attacks, do not apply to the Chaum or Neff schemes, but are a potential threat in Prêt à Voter, or indeed any crypto system with pre-printed ballot forms. Where appropriate, we propose enhancements and counter-measures. Our analysis shows that Prêt à Voter is remarkably robust against a large class of socio-technical vulnerabilities, including those described in [11].