• DocumentCode
    1365566
  • Title

    The Effectiveness of Receipt-Based Attacks on ThreeBallot

  • Author

    Henry, Kevin ; Stinson, Douglas R. ; Sui, Jiayuan

  • Author_Institution
    Cryptography, Security, & Privacy (CrySP) Lab., Univ. of Waterloo, Waterloo, ON, Canada
  • Volume
    4
  • Issue
    4
  • fYear
    2009
  • Firstpage
    699
  • Lastpage
    707
  • Abstract
    The ThreeBallot voting system is an end-to-end voter-verifiable voting system. Each voter fills out three ballots according to a few simple rules and takes a copy of one of them home as a receipt for verification purposes. All ballots are posted on a public bulletin board so that any voter may verify the result. In this paper, we provide the first steps toward investigating the effectiveness of attacks using the voter´s receipt and the bulletin board, using a theoretical rather than simulation-based approach. Focusing on two-candidate races, we determine thresholds for when a voter´s vote can be reconstructed from their receipt, and when a coercer can effectively verify if a voter followed instructions by looking for prespecified patterns on the bulletin board. Combining these two results allows us to determine safe ballot sizes that resist known attacks. We also generalize a previous observation that an individual receipt can leak information about a voter´s choices.
  • Keywords
    government data processing; security of data; ThreeBallot voting system; e-voting; end-to-end voter-verifiable voting system; public bulletin board; receipt-based attacks; verification purposes; Anonymity; attack; e-voting; privacy;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2009.2031914
  • Filename
    5233854