Abstract
In this paper, we introduce the notion of mental voting booths, i.e., a building block for voting schemes that provides remote voters with similar protection as that offered by physical voting booths, essentially protecting them from over-the-shoulder coercion attacks (shoulder-surfing). We introduce a framework to model voting booths and formulate a property of the modelled booths that is sufficient to ensure over-the-shoulder coercion resistance. Next, we propose an example of mental booth that is simple enough to be used by any voter without prior training and show that an execution of the remote booth in the presence of the adversary is equivalent to that execution in his absence (e.g., inside a physical booth). The only cost lies in the use of an untappable channel in order to transmit a piece of information before the voting phase. Mental booths also allow for the voter to safely delegate his own voice to an untrusted person while still being able to verify that the untrusted person followed his instructions while voting.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adida, B.: Helios: web-based open-audit voting. In: Proceedings of the 17th Conference on Security Symposium, pp. 335–348. USENIX Association, Berkeley (2008)
Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 2009, p. 10. USENIX Association, Berkeley (2009)
Argonne National Laboratory, The Brad Blog: “Man-in-the-middle” remote attack on Diebold touch-screen voting machine by Argonne national lab (video) (2011), http://www.youtube.com/watch?feature=player_embedded&v=DMw2dn6K1oI
Argonne National Laboratory, The Brad Blog: Remote vote tampering attack on a sequoia avc voting machine by argonne national lab (2011)
Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, pp. 195–209. IEEE Computer Society (2008)
Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC 1994, pp. 544–553. ACM, New York (1994)
Bohli, J.M., Mueller-Quade, J., Roehrich, S.: Bingo Voting: Secure and coercion-free voting using a trusted random number generator (2007), http://eprint.iacr.org/2007/162
Canetti, R., Gennaro, R.: Incoercible multiparty computation. In: Annual IEEE Symposium on Foundations of Computer Science, p. 504 (1996)
Chaum, D.: SureVote: Technical Overview. In: Preproceedings of the Workshop on Trustworthy Elections. In: WOTE 2001 (2001)
Chaum, D.: SureVote: How it works (2011), http://www.surevote.com/
Clark, J., Hengartner, U.: Selections: An internet voting system with over-the-shoulder coercion-resistance. In: Financial Cryptography and Data Security (2011)
Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354–368. IEEE Computer Society (2008)
Dall’Olio, E., Markowitch, O.: Voting with designated verifier signature-like protocol. In: International Conference WWW/Internet, pp. 295–301. IADIS (2004)
Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: IEEE Computer Security Foundations Workshop, pp. 28–42. IEEE Computer Society, Los Alamitos (2006)
Dill, D.L., Castro, D.: Point/counterpoint: The u.s. should ban paperless electronic voting machines. Commun. ACM 51, 29–33 (2008)
Dossogne, J., Markowitch, O.: A tripartite strong designated verifier scheme based on threshold rsa signatures. In: International Conference on Security & Management, pp. 314–317. CSREA Press (2009)
Dossogne, J., Markowitch, O.: Online banking and man in the browser attacks, survey of the belgian situation. In: Goseling, J., Weber, J.H. (eds.) Proceedings of the 31th Symposium on Information Theory in the Benelux (WICSITB 2010), Rotterdam, The Netherlands, pp. 19–26 (2010)
Friedman, B.: Diebold voting machines can be hacked by remote control (September 27, 2011), http://politics.salon.com/2011/09/27/votinghack/
Friedman, B.: National Security Lab Hacks Diebold Touch-Screen Voting Machine by Remote Control With $26 in Computer (September 27, 2011), http://www.bradblog.com/?p=8785
Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: Analyzing internet voting security. Commun. ACM 47, 59–64 (2004)
Joaquim, R., Ribeiro, C.: CodeVoting protection against automatic vote manipulation in an uncontrolled environment. In: Proceedings of the 1st International Conference on Evoting and Identity, pp. 178–188. Springer, Heidelberg (2007)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 61–70. ACM, New York (2005)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 37–63. Springer, Heidelberg (2010)
Kenski, K.: To I-Vote or Not to I-Vote?: Opinions About Internet Voting from Arizona Voters. Social Science Computer Review 23, 293–303 (2005)
Kuhn, M.G.: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005)
Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures: anonymity without encryption. Information Processing Letters 102(2-3), 127–132 (2007)
Laroussinie, F., Schnoebelen, P.: The State Explosion Problem from Trace to Bisimulation Equivalence. In: Tiuryn, J. (ed.) FOSSACS 2000. LNCS, vol. 1784, pp. 192–207. Springer, Heidelberg (2000)
Magkos, E., Burmester, M., Chrissikopoulos, V.: Receipt-freeness in large-scale elections without untappable channels. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society. IFIP, vol. 74, pp. 683–693. Springer, Boston (2002)
Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006)
Qadah, G.Z., Taha, R.: Electronic voting systems: Requirements, design, and implementation. Computer Standards & Interfaces 29(3), 376–386 (2007)
Sampigethaya, K., Poovendran, R.: A framework and taxonomy for comparison of electronic voting schemes. Computers & Security 25(2), 137–153 (2006)
Sanford, C., Rose, J.: Characterizing eparticipation. International Journal of Information Management 27(6), 406–421 (2007)
Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 56–66. ACM, New York (2006)
Weldemariam, K., Villafiorita, A.: A survey: Electronic voting development and trends. In: Electronic Voting, pp. 119–131 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dossogne, J., Lafitte, F. (2012). Mental Voting Booths. In: Laud, P. (eds) Information Security Technology for Applications. NordSec 2011. Lecture Notes in Computer Science, vol 7161. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29615-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-29615-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29614-7
Online ISBN: 978-3-642-29615-4
eBook Packages: Computer ScienceComputer Science (R0)