Paper 2024/1354

Votexx: Extreme Coercion Resistance

David Chaum, xx network
Richard T. Carback, xx network
Mario Yaksetig, xx network, University of Porto
Jeremy Clark, Concordia University
Mahdi Nejadgholi
Bart Preneel, KU Leuven
Alan T. Sherman, University of Maryland, Baltimore County
Filip Zagorski, University of Wroclaw
Bingsheng Zhang
Zeyuan Yin, Zhejiang University
Abstract

We provide a novel perspective on a long-standing challenge to the integrity of votes cast without the supervision of a voting booth: "improper influence,'' which we define as any combination of vote buying and voter coercion. In comparison with previous proposals, our system is the first in the literature to protect against a strong adversary who learns all of the voter's keys---we call this property "extreme coercion resistance.'' When keys are stolen, each voter, or their trusted agents (which we call "hedgehogs''), may "nullify'' (effectively cancel) their vote in a way that is unstoppable and irrevocable, and such that the nullification action is forever unattributable to that voter or their hedgehog(s). We demonstrate the security of our VoteXX system in the universal composability model. As in many other coercion-resistant systems, voters are authorized to vote with public-private keys. Each voter registers their public keys with the Election Authority (EA) in a way that convinces the EA that the voter has memorized a passphrase that corresponds to their private keys. As a consequence, if an adversary obtains a voter's keys, the voter also retains a copy. Voters concerned about adversaries stealing their private keys can themselves, or by delegating to one or more untrusted hedgehog(s), monitor the bulletin board for malicious ballots cast with their keys, and can act to nullify these ballots in a privacy-preserving manner with zero-knowledge proofs. In comparison with previous proposals, our system offers some protection against even the strongest adversary who learns all keys. Other coercion-resistant protocols either do not address these attacks, place strong limitations on adversarial abilities, or rely on fully trusted parties to assist voters with their keys.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
coercion resistancehigh-integrity votingvoter-verifiable elections
Contact author(s)
rick @ xx network
myaksetig @ gmail com
xoredtwice @ pm me
History
2024-08-30: approved
2024-08-28: received
See all versions
Short URL
https://ia.cr/2024/1354
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1354,
      author = {David Chaum and Richard T. Carback and Mario Yaksetig and Jeremy Clark and Mahdi Nejadgholi and Bart Preneel and Alan T. Sherman and Filip Zagorski and Bingsheng Zhang and Zeyuan Yin},
      title = {Votexx: Extreme Coercion Resistance},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1354},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1354}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.