TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral
- URL: http://arxiv.org/abs/2202.06692v3
- Date: Tue, 14 Oct 2025 08:29:23 GMT
- Title: TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral
- Authors: Louis-Henri Merino, Simone Colombo, Rene Reyes, Alaleh Azhir, Shailesh Mishra, Pasindu Tennage, Mohammad Amin Raeisi, Haoqian Zhang, Jeff R. Allen, Bernhard Tellenbach, Vero Estrada-GaliƱanes, Bryan Ford,
- Abstract summary: Votegral is a coercion-resistant voting architecture that leverages the physical security of in-person registration to address credential-issuance challenges.<n>The voter learns and can verify in the privacy booth which credential is real, but real and fake credentials thereafter appear indistinguishable to others.<n>Results with our prototype suggest that Votegral is practical and sufficiently scalable for real-world elections.
- Score: 4.589345192613584
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Online voting is convenient and flexible, but amplifies the risks of voter coercion and vote buying. One promising mitigation strategy enables voters to give a coercer fake voting credentials, which silently cast votes that do not count. Current systems along these lines make problematic assumptions about credential issuance, however, such as strong trust in a registrar and/or in voter-controlled hardware, or expecting voters to interact with multiple registrars. Votegral is the first coercion-resistant voting architecture that leverages the physical security of in-person registration to address these credential-issuance challenges, amortizing the convenience costs of in-person registration by reusing credentials across successive elections. Votegral's registration component, TRIP, gives voters a kiosk in a privacy booth with which to print real and fake credentials on paper, eliminating dependence on trusted hardware in credential issuance. The voter learns and can verify in the privacy booth which credential is real, but real and fake credentials thereafter appear indistinguishable to others. Only voters actually under coercion, a hopefully-rare case, need to trust the kiosk. To achieve verifiability, each paper credential encodes an interactive zero-knowledge proof, which is sound in real credentials but unsound in fake credentials. Voters observe the difference in the order of printing steps, but need not understand the technical details. Experimental results with our prototype suggest that Votegral is practical and sufficiently scalable for real-world elections. User-visible latency of credential issuance in TRIP is at most 19.7 seconds even on resource-constrained kiosk hardware. A companion usability study indicates that TRIP's usability is competitive with other e-voting systems, and formal proofs support TRIP's combination of coercion-resistance and verifiability.
Related papers
- Enhanced Anonymous Credentials for E-Voting Systems [0.0]
A simple and practical method for achieving everlasting privacy in e-voting systems is to use anonymous voter credentials.<n>This paper considers a simple augmentation to the anonymous credential mechanism, using perfectly hiding commitments to link such credentials to the voter identities.<n>It ensures that published ballots remain unlinkable to voter identities, yet enables necessary consistency checks during ballot casting and ballot auditing.
arXiv Detail & Related papers (2025-11-13T12:51:32Z) - Cryptographic Verifiability for Voter Registration Systems [3.6798637279632085]
Voter registration systems are a critical element of most high-stakes elections.
This work introduces cryptographic verifiability for voter registration systems.
We introduce VRLog, the first system to bring strong verifiability to voter registration.
arXiv Detail & Related papers (2025-03-05T23:51:04Z) - Efficient Lower Bounding of Single Transferable Vote Election Margins [56.12949230611067]
Single transferable vote (STV) is a system of preferential proportional voting employed in multi-seat elections.<n>The margin of victory, or simply'margin', is the smallest number of ballots that need to be manipulated to alter the set of winners.<n>Lower bounds on the margin can also be used for this purpose, in cases where exact margins are difficult to compute.
arXiv Detail & Related papers (2025-01-24T13:39:23Z) - Optimal bounds for dissatisfaction in perpetual voting [84.02572742131521]
We consider a perpetual approval voting method that guarantees that no voter is dissatisfied too many times.
We identify a sufficient condition on voter behavior under which a sublinear growth of dissatisfaction is possible.
We present a voting method with sublinear guarantees on dissatisfaction under bounded conflicts, based on the standard techniques from prediction with expert advice.
arXiv Detail & Related papers (2024-12-20T19:58:55Z) - MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations [2.206168301581203]
We introduce the MERGE protocol to combine the speed of electronic ballot delivery with the reliability of paper returns.
This protocol allows voters to submit an electronic record of their vote quickly while simultaneously mailing a paper ballot for verification.
The electronic record can be used for preliminary results, but the paper ballot is used in a Risk Limiting Audit (RLA) if received in time, ensuring the integrity of the election.
arXiv Detail & Related papers (2024-10-09T09:19:01Z) - Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version) [1.306972554821087]
We present a study with 300 participants which aims to evaluate the voters' experience of the receipt-freeness procedures in the e-voting protocol Selene.
While the usability and trust factors were rated low in the experiments, we found a positive correlation between trust and understanding.
arXiv Detail & Related papers (2024-07-18T07:49:39Z) - E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting [1.0721573281744934]
Online voting is more susceptible to voter coercion and vote buying than in-person voting.
One mitigation is to give voters fake voting credentials that they can yield to a coercer.
Fake credentials appear identical to real ones, but cast votes that are silently omitted from the final tally.
arXiv Detail & Related papers (2024-04-18T10:57:32Z) - The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording [51.82772358241505]
Risk-limiting audits (RLAs) are techniques for verifying the outcomes of large elections.
We define new families of audits that improve efficiency and offer advances in statistical power.
New audits are enabled by revisiting the standard notion of a cast-vote record so that it can declare multiple possible mark interpretations.
arXiv Detail & Related papers (2024-02-09T16:23:54Z) - Short Voting Codes For Practical Code Voting [0.0]
We embed the mechanism in a protocol that avoids complex cryptography in both the setup and the voting phase.
Trusting the setup, and one out of multiple server components, the protocol provides vote secrecy, cast-as-intended, recorded-as-cast, tallied-as-recorded, eligibility and universal verifiability.
arXiv Detail & Related papers (2023-11-21T16:25:17Z) - Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE [61.872917066847855]
Methods for auditing instant-runoff voting (IRV) elections are either not risk-limiting or require cast vote records (CVRs), the voting system's electronic record of the votes on each ballot.
We develop an RLA method that uses adaptively weighted averages of test supermartingales to efficiently audit IRV elections when CVRs are not available.
arXiv Detail & Related papers (2023-07-20T15:55:34Z) - Private Multi-Winner Voting for Machine Learning [48.0093793427039]
We propose three new DP multi-winner mechanisms: Binary, $tau$, and Powerset voting.
Binary voting operates independently per label through composition.
$tau$ voting bounds votes optimally in their $ell$ norm for tight data-independent guarantees.
Powerset voting operates over the entire binary vector by viewing the possible outcomes as a power set.
arXiv Detail & Related papers (2022-11-23T20:06:46Z) - DeFakePro: Decentralized DeepFake Attacks Detection using ENF
Authentication [66.2466055910145]
DeFakePro is a consensus mechanism-based Deepfake detection technique in online video conferencing tools.
The similarity in ENF signal fluctuations is utilized in the PoENF algorithm to authenticate the media broadcasted in conferencing tools.
arXiv Detail & Related papers (2022-07-22T01:22:11Z) - Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules [5.156484100374059]
One of the main challenges in e-voting systems is to certify that the computed results are consistent with the cast ballots.
We propose a secure voting protocol for elections governed by order-based voting rules.
Our protocol offers perfect ballot secrecy, in the sense that it issues only the required output, while no other information on the cast ballots is revealed.
arXiv Detail & Related papers (2022-05-21T12:17:21Z) - Obvious Manipulability of Voting Rules [105.35249497503527]
The Gibbard-Satterthwaite theorem states that no unanimous and non-dictatorial voting rule is strategyproof.
We revisit voting rules and consider a weaker notion of strategyproofness called not obvious manipulability.
arXiv Detail & Related papers (2021-11-03T02:41:48Z) - Bribery as a Measure of Candidate Success: Complexity Results for
Approval-Based Multiwinner Rules [58.8640284079665]
We study the problem of bribery in multiwinner elections, for the case where the voters cast approval ballots (i.e., sets of candidates they approve)
We consider a number of approval-based multiwinner rules (AV, SAV, GAV, RAV, approval-based Chamberlin--Courant, and PAV)
In general, our problems tend to be easier when we limit out bribery actions on increasing the number of approvals of the candidate that we want to be in a winning committee.
arXiv Detail & Related papers (2021-04-19T08:26:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.