DocumentCode :
1365566
Title :
The Effectiveness of Receipt-Based Attacks on ThreeBallot
Author :
Henry, Kevin ; Stinson, Douglas R. ; Sui, Jiayuan
Author_Institution :
Cryptography, Security, & Privacy (CrySP) Lab., Univ. of Waterloo, Waterloo, ON, Canada
Volume :
4
Issue :
4
fYear :
2009
Firstpage :
699
Lastpage :
707
Abstract :
The ThreeBallot voting system is an end-to-end voter-verifiable voting system. Each voter fills out three ballots according to a few simple rules and takes a copy of one of them home as a receipt for verification purposes. All ballots are posted on a public bulletin board so that any voter may verify the result. In this paper, we provide the first steps toward investigating the effectiveness of attacks using the voter´s receipt and the bulletin board, using a theoretical rather than simulation-based approach. Focusing on two-candidate races, we determine thresholds for when a voter´s vote can be reconstructed from their receipt, and when a coercer can effectively verify if a voter followed instructions by looking for prespecified patterns on the bulletin board. Combining these two results allows us to determine safe ballot sizes that resist known attacks. We also generalize a previous observation that an individual receipt can leak information about a voter´s choices.
Keywords :
government data processing; security of data; ThreeBallot voting system; e-voting; end-to-end voter-verifiable voting system; public bulletin board; receipt-based attacks; verification purposes; Anonymity; attack; e-voting; privacy;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2009.2031914
Filename :
5233854
Link To Document :
بازگشت