Rethinking Voter Coercion: The Realities Imposed by Technology
نویسنده
چکیده
When the Australian secret ballot was introduced in the 1850s, it not only provided privacy for those voters who wanted it, but it also effectively eliminated coercion by allowing no viable means for voters to prove their votes to third parties. In an environment where the privacy of voters is enforced by independent observers, coerced voters could freely express their true preferences while making their selections. In contrast, modern technologies render the traditional poll-site protections largely ineffective, and the limited remaining options for preserving these protections will almost certainly disappear in the not-too-distant future. Today, in-person voters routinely carry video recording equipment and other technologies that facilitate coercion into polls, and although not yet ubiquitous, inexpensive and unobtrusive wearable video recording devices are readily available. In view of these realities, it is appropriate to re-examine the efforts and countermeasures currently employed and explore what defenses are possible and reasonable against various forms of voter coercion.
منابع مشابه
Coercion-resistance as Opacity in Voting Systems
Coercion-resistance is one of the key requirements of voting systems as it prevents an outsider from trying to persuade the voter to vote in a certain way. Although it usually implies receipt-freeness [15], it is usually formalised as a stronger property [23]. In this paper we analyse two voting schemes for coercion-resistance, namely Prêt à Voter [12] and FOO [17], and find that many of the re...
متن کاملScroll, Match & Vote: An E2E Coercion Resistant Mobile Voting System
Mobile Internet Elections are appealing for several reasons; they promise voter convenience, lower abstention rates and lower costs. However, there are a number of trust issues that prevent them from becoming ubiquitous, the most relevant of which is the possibility of coercion of the voter at the time of the vote. But other issues, like the trustworthiness of both the services running the elec...
متن کاملA coercion-resistant protocol for conducting elections by telephone
We present a protocol that allows voters to phone in their votes. Our protocol makes it expensive for a candidate and a voter to cooperate to prove to the candidate who the voter voted for. When the electoral pool is large enough, the cost to the candidate of manipulating sufficiently many votes to have an influence on the election results becomes impossibly expensive. Hence, the protocol provi...
متن کاملAn e-Voting Scheme with Improved Resistance to Bribe and Coercion
Bribe and coercion are common in conventional voting systems and usually will lead to a biased result that imparts the desired democracy. However, these problems become more difficult to solve when using e-voting schemes. Up to now, many e-voting schemes have been proposed to provide receipt-freeness and uncoercibility to solve these problems. Unfortunately, none is both secure and practical en...
متن کاملDefining Privacy for Weighted Votes, Single and Multi-voter Coercion
Most existing formal privacy definitions for voting protocols are based on observational equivalence between two situations where two voters swap their votes. These definitions are unsuitable for cases where votes are weighted. In such a case swapping two votes can result in a different outcome and both situations become trivially distinguishable. We present a definition for privacy in voting p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013