Natural Strategic Abilities in Voting Protocols

07/24/2020
by   Wojciech Jamroga, et al.
0

Security properties are often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the property at hand. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks. Here, we propose a graded notion of security based on the complexity of the user's strategic behavior. More precisely, we suggest that the level to which a security property φ is satisfied can be defined in terms of (a) the complexity of the strategy that the voter needs to execute to make φ true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain φ, the higher the degree of security. We demonstrate how the idea works in a case study based on an electronic voting scenario. To this end, we model the vVote implementation of the voting protocol for coercion-resistant and voter-verifiable elections. Then, we identify "natural" strategies for the voter to obtain receipt-freeness, and measure the voter's effort that they require. We also look at how hard it is for the coercer to compromise the election through a randomization attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/25/2022

Bisimulations for Verifying Strategic Abilities with an Application to the ThreeBallot Voting Protocol

We propose a notion of alternating bisimulation for strategic abilities ...
research
05/31/2021

User Experience Design for E-Voting: How mental models align with security mechanisms

This paper presents a mobile application for vote-casting and vote-verif...
research
05/14/2019

Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels

Vote-buying and voter-coercion are the impending threats when deploying ...
research
07/24/2020

Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal

The design and implementation of an e-voting system is a challenging tas...
research
10/10/2022

Obvious Independence of Clones

The Independence of Clones (IoC) criterion for social choice functions (...
research
09/05/2021

UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System

Estonian Internet voting has been used in national-wide elections since ...

Please sign up or login with your details

Forgot password? Click here to reset