2009 30th IEEE Symposium on Security and Privacy 2009
DOI: 10.1109/sp.2009.13
|View full text |Cite
|
Sign up to set email alerts
|

An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols

Abstract: Coercion resistance is an important and one of the most intricate security requirements of electronic voting protocols. Several definitions of coercion resistance have been proposed in the literature, including definitions based on symbolic models. However, existing definitions in such models are rather restricted in their scope and quite complex.In this paper, we therefore propose a new definition of coercion resistance in a symbolic setting, based on an epistemic approach. Our definition is relatively simple… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(40 citation statements)
references
References 33 publications
0
40
0
Order By: Relevance
“…However, as pointed out in [15], it has no well-agreed formal definition for the concept of voter-coercion resistance; it is usually only stated in natural language. Juels et al proposed a computational definition in [12], and authors in [44] analyzed voter-coercion resistance in an epistemic approach. [25] divided voter-coercion into two categories: explicit coercion and silent coercion, where silent coercion also takes credential leakage into account.…”
Section: Voter-coercion Resistancementioning
confidence: 99%
“…However, as pointed out in [15], it has no well-agreed formal definition for the concept of voter-coercion resistance; it is usually only stated in natural language. Juels et al proposed a computational definition in [12], and authors in [44] analyzed voter-coercion resistance in an epistemic approach. [25] divided voter-coercion into two categories: explicit coercion and silent coercion, where silent coercion also takes credential leakage into account.…”
Section: Voter-coercion Resistancementioning
confidence: 99%
“…This approach is extended in [4] to handle forced abstention attacks explicitly. The epistemic approach of [5] takes a similar view of coercion-resistance.…”
Section: A Definitionsmentioning
confidence: 99%
“…[8]). Moreover, according to [8,17], coercion-resistance implies receipt-freeness, while [4] claims that it is possible to have a voting scheme which is coercion-resistant and yet not receiptfree. These contradictory assertions show that the concept of anonymity requires clarification as well.…”
Section: Background and Motivationmentioning
confidence: 99%