Natural Strategic Abilities in Voting Protocols

by   Wojciech Jamroga, et al.

Security properties are often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the property at hand. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks. Here, we propose a graded notion of security based on the complexity of the user's strategic behavior. More precisely, we suggest that the level to which a security property φ is satisfied can be defined in terms of (a) the complexity of the strategy that the voter needs to execute to make φ true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain φ, the higher the degree of security. We demonstrate how the idea works in a case study based on an electronic voting scenario. To this end, we model the vVote implementation of the voting protocol for coercion-resistant and voter-verifiable elections. Then, we identify "natural" strategies for the voter to obtain receipt-freeness, and measure the voter's effort that they require. We also look at how hard it is for the coercer to compromise the election through a randomization attack.



There are no comments yet.


page 1

page 2

page 3

page 4


Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallot Voting Protocol

We propose a notion of alternating bisimulation for strategic abilities ...

Strategic Voting Under Uncertainty About the Voting Method

Much of the theoretical work on strategic voting makes strong assumption...

User Experience Design for E-Voting: How mental models align with security mechanisms

This paper presents a mobile application for vote-casting and vote-verif...

Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal

The design and implementation of an e-voting system is a challenging tas...

A Comprehensive Analysis of Quantum E-voting Protocols

Recent advances at Google, IBM, as well as a number of research groups i...

Dispute Resolution in Voting

In voting, disputes arise when a voter claims that the voting authority ...

UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System

Estonian Internet voting has been used in national-wide elections since ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.