Coercion-Resistant Remote Voting using Decryption Mixes
نویسندگان
چکیده
The recently proposed Prêt à Voter election scheme uses decryption mixes to achieve anonymity of votes and verifiability of an election while requiring minimal trust in the component of the election system that performs these mixes. However, this scheme still requires trust in several human and machine components; these requirements make the scheme impractical for use in remote voting. To adapt the scheme for remote voting, new protocols are proposed that preserve anonymity and verifiability and additionally achieve coercion resistance. The scheme is also extended to allow Condorcet voting methods. An implementation is in progress using Jif, a security-typed language.
منابع مشابه
A Receipt-free Coercion-resistant Remote Internet Voting Protocol without Physical Assumptions through Deniable Encryption and Trapdoor Commitment Scheme
The secure remote Internet voting protocol play an important role in Internet voting system. The direction of development of remote Internet voting protocol is that implementation of receipt-freeness and coercion-resistance is from with strong physical assumptions to with weak physical assumptions. The final purpose is that receiptfreeness and coercion-resistance is implemented without physical...
متن کاملRemote e-Voting and Coercion: a Risk-Assessment Model and Solutions
This paper, useful to anyone who has to address the public and representatives of the world of politics, focuses on the specific topic of resistance to vote-coercion. By using a model, we want to illustrate the implicit – and possibly realistic assumption that vote-buying is not profitable or doable in current conditions. But these assumptions do not necessarily hold good in all environments. F...
متن کاملRobust Coercion-Resistant Registration for Remote E-voting
During the registration phase of remote electronic voting schemes, the voter obtains a credential that proves the validity of her vote later, in the tallying phase. Most of the existing remote coercionresistant schemes either omit the description of the the registration phase or assume the existence of a trusted registering authority that authenticates voters as well as creates and distributes ...
متن کاملTrue Trustworthy Elections: Remote Electronic Voting Using Trusted Computing
We present a new remote, coercion-resistant electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce trusted computing as a method of ensuring the trustworthiness of remote voters, and provide an extension to our protocol allowing revocable anonymity, on the grounds of it being a legal requirement in the United Kingdom.
متن کامل