Abstract

The outbreak of the COVID-19 pandemic brought renewed attention to electronic voting—this time as a potential option to contain the spread during elections. One of the long unresolved topics with remote voting is the risk of voter’s coercion due to the uncontrolled environment in which it takes place, indicating the importance of the coercion resistance property. In the present article, the authors conduct a database analysis of over 350 articles to present different formal definitions of coercion resistance based on three frameworks (game-based definitions, applied pi-calculus, and logic). Finally, the different security properties of each one are studied and compared in order to facilitate the development of electronic voting schemes.

Highlights

  • This paper introduces the identification of different formal definitions of coercion resistance available in e-voting literature

  • The first formal definition of coercion resistance was introduced by Juels, Catalano, and Jakobsson in [1]

  • Coercion resistance is a security property that can be expressed in a wide variety of ways

Read more

Summary

Introduction

Since the start of the COVID-19 pandemic in 2020, discussions about online voting have become prominent due to the increased health risks of traditional, presential voting. Despite its advantages, online voting inherently brings certain security risks. The risk of voter coercion, ranging from an adversary asking for proof of a voter’s choice to a coercer monitoring the voting process has been at the core within the pending challenges. Any further deployment of e-voting schemes should address the coercion resistance property, which was first defined in [1]. A coercion-resistant scheme guarantees the voter’s privacy even if an attacker can monitor the process and communicate with the voter. A number of such schemes have been proposed, relying on different assumptions about the attackers’ capabilities, as well as security assurances against coercion defined through formal specifications (e.g., cryptographic definitions)

Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call