Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7161))

Included in the following conference series:

Abstract

In this paper, we introduce the notion of mental voting booths, i.e., a building block for voting schemes that provides remote voters with similar protection as that offered by physical voting booths, essentially protecting them from over-the-shoulder coercion attacks (shoulder-surfing). We introduce a framework to model voting booths and formulate a property of the modelled booths that is sufficient to ensure over-the-shoulder coercion resistance. Next, we propose an example of mental booth that is simple enough to be used by any voter without prior training and show that an execution of the remote booth in the presence of the adversary is equivalent to that execution in his absence (e.g., inside a physical booth). The only cost lies in the use of an untappable channel in order to transmit a piece of information before the voting phase. Mental booths also allow for the voter to safely delegate his own voice to an untrusted person while still being able to verify that the untrusted person followed his instructions while voting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adida, B.: Helios: web-based open-audit voting. In: Proceedings of the 17th Conference on Security Symposium, pp. 335–348. USENIX Association, Berkeley (2008)

    Google Scholar 

  2. Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE 2009, p. 10. USENIX Association, Berkeley (2009)

    Google Scholar 

  3. Argonne National Laboratory, The Brad Blog: “Man-in-the-middle” remote attack on Diebold touch-screen voting machine by Argonne national lab (video) (2011), http://www.youtube.com/watch?feature=player_embedded&v=DMw2dn6K1oI

  4. Argonne National Laboratory, The Brad Blog: Remote vote tampering attack on a sequoia avc voting machine by argonne national lab (2011)

    Google Scholar 

  5. Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, pp. 195–209. IEEE Computer Society (2008)

    Google Scholar 

  6. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC 1994, pp. 544–553. ACM, New York (1994)

    Chapter  Google Scholar 

  7. Bohli, J.M., Mueller-Quade, J., Roehrich, S.: Bingo Voting: Secure and coercion-free voting using a trusted random number generator (2007), http://eprint.iacr.org/2007/162

  8. Canetti, R., Gennaro, R.: Incoercible multiparty computation. In: Annual IEEE Symposium on Foundations of Computer Science, p. 504 (1996)

    Google Scholar 

  9. Chaum, D.: SureVote: Technical Overview. In: Preproceedings of the Workshop on Trustworthy Elections. In: WOTE 2001 (2001)

    Google Scholar 

  10. Chaum, D.: SureVote: How it works (2011), http://www.surevote.com/

  11. Clark, J., Hengartner, U.: Selections: An internet voting system with over-the-shoulder coercion-resistance. In: Financial Cryptography and Data Security (2011)

    Google Scholar 

  12. Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354–368. IEEE Computer Society (2008)

    Google Scholar 

  13. Dall’Olio, E., Markowitch, O.: Voting with designated verifier signature-like protocol. In: International Conference WWW/Internet, pp. 295–301. IADIS (2004)

    Google Scholar 

  14. Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: IEEE Computer Security Foundations Workshop, pp. 28–42. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  15. Dill, D.L., Castro, D.: Point/counterpoint: The u.s. should ban paperless electronic voting machines. Commun. ACM 51, 29–33 (2008)

    Article  Google Scholar 

  16. Dossogne, J., Markowitch, O.: A tripartite strong designated verifier scheme based on threshold rsa signatures. In: International Conference on Security & Management, pp. 314–317. CSREA Press (2009)

    Google Scholar 

  17. Dossogne, J., Markowitch, O.: Online banking and man in the browser attacks, survey of the belgian situation. In: Goseling, J., Weber, J.H. (eds.) Proceedings of the 31th Symposium on Information Theory in the Benelux (WICSITB 2010), Rotterdam, The Netherlands, pp. 19–26 (2010)

    Google Scholar 

  18. Friedman, B.: Diebold voting machines can be hacked by remote control (September 27, 2011), http://politics.salon.com/2011/09/27/votinghack/

  19. Friedman, B.: National Security Lab Hacks Diebold Touch-Screen Voting Machine by Remote Control With $26 in Computer (September 27, 2011), http://www.bradblog.com/?p=8785

  20. Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: Analyzing internet voting security. Commun. ACM 47, 59–64 (2004)

    Article  Google Scholar 

  21. Joaquim, R., Ribeiro, C.: CodeVoting protection against automatic vote manipulation in an uncontrolled environment. In: Proceedings of the 1st International Conference on Evoting and Identity, pp. 178–188. Springer, Heidelberg (2007)

    Google Scholar 

  22. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 61–70. ACM, New York (2005)

    Chapter  Google Scholar 

  23. Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 37–63. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  24. Kenski, K.: To I-Vote or Not to I-Vote?: Opinions About Internet Voting from Arizona Voters. Social Science Computer Review 23, 293–303 (2005)

    Article  Google Scholar 

  25. Kuhn, M.G.: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures: anonymity without encryption. Information Processing Letters 102(2-3), 127–132 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  27. Laroussinie, F., Schnoebelen, P.: The State Explosion Problem from Trace to Bisimulation Equivalence. In: Tiuryn, J. (ed.) FOSSACS 2000. LNCS, vol. 1784, pp. 192–207. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  28. Magkos, E., Burmester, M., Chrissikopoulos, V.: Receipt-freeness in large-scale elections without untappable channels. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society. IFIP, vol. 74, pp. 683–693. Springer, Boston (2002)

    Chapter  Google Scholar 

  29. Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  30. Qadah, G.Z., Taha, R.: Electronic voting systems: Requirements, design, and implementation. Computer Standards & Interfaces 29(3), 376–386 (2007)

    Article  Google Scholar 

  31. Sampigethaya, K., Poovendran, R.: A framework and taxonomy for comparison of electronic voting schemes. Computers & Security 25(2), 137–153 (2006)

    Article  Google Scholar 

  32. Sanford, C., Rose, J.: Characterizing eparticipation. International Journal of Information Management 27(6), 406–421 (2007)

    Article  Google Scholar 

  33. Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 56–66. ACM, New York (2006)

    Chapter  Google Scholar 

  34. Weldemariam, K., Villafiorita, A.: A survey: Electronic voting development and trends. In: Electronic Voting, pp. 119–131 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dossogne, J., Lafitte, F. (2012). Mental Voting Booths. In: Laud, P. (eds) Information Security Technology for Applications. NordSec 2011. Lecture Notes in Computer Science, vol 7161. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29615-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29615-4_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29614-7

  • Online ISBN: 978-3-642-29615-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics