B-Privacy: Defining and Enforcing Privacy in Weighted Voting
- URL: http://arxiv.org/abs/2509.17871v2
- Date: Tue, 30 Sep 2025 21:20:52 GMT
- Title: B-Privacy: Defining and Enforcing Privacy in Weighted Voting
- Authors: Samuel Breckenridge, Dani Vilardell, Andrés Fábrega, Amy Zhao, Patrick McCorry, Rafael Solari, Ari Juels,
- Abstract summary: We show that voting systems that weight votes in proportion to token holdings overturn existing notions of voter privacy.<n>We introduce a notion called B-privacy whose basis is bribery, a key problem in voting systems today.<n>We propose a mechanism to boost B-privacy by noising voting tallies.
- Score: 5.354673685777723
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In traditional, one-vote-per-person voting systems, privacy equates with ballot secrecy: voting tallies are published, but individual voters' choices are concealed. Voting systems that weight votes in proportion to token holdings, though, are now prevalent in cryptocurrency and web3 systems. We show that these weighted-voting systems overturn existing notions of voter privacy. Our experiments demonstrate that even with secret ballots, publishing raw tallies often reveals voters' choices. Weighted voting thus requires a new framework for privacy. We introduce a notion called B-privacy whose basis is bribery, a key problem in voting systems today. B-privacy captures the economic cost to an adversary of bribing voters based on revealed voting tallies. We propose a mechanism to boost B-privacy by noising voting tallies. We prove bounds on its tradeoff between B-privacy and transparency, meaning reported-tally accuracy. Analyzing 3,582 proposals across 30 Decentralized Autonomous Organizations (DAOs), we find that the prevalence of large voters ("whales") limits the effectiveness of any B-Privacy-enhancing technique. However, our mechanism proves to be effective in cases without extreme voting weight concentration: among proposals requiring coalitions of $\geq5$ voters to flip outcomes, our mechanism raises B-privacy by a geometric mean factor of $4.1\times$. Our work offers the first principled guidance on transparency-privacy tradeoffs in weighted-voting systems, complementing existing approaches that focus on ballot secrecy and revealing fundamental constraints that voting weight concentration imposes on privacy mechanisms.
Related papers
- Your Privacy Depends on Others: Collusion Vulnerabilities in Individual Differential Privacy [50.66105844449181]
Individual Differential Privacy (iDP) promises users control over their privacy, but this promise can be broken in practice.<n>We reveal a previously overlooked vulnerability in sampling-based iDP mechanisms.<n>We propose $(varepsilon_i,_i,overline)$-iDP a privacy contract that uses $$-divergences to provide users with a hard upper bound on their excess vulnerability.
arXiv Detail & Related papers (2026-01-19T10:26:12Z) - Are Voters Willing to Collectively Secure Elections? Unraveling a Practical Blockchain Voting System [0.0]
This paper proposes the concept of collectively secure voting, in which voters themselves can opt in as secret holders to protect ballot secrecy.<n>A practical blockchain-based collectively secure voting system is designed and implemented.<n>Results show a high willingness to act as secret holders, reliable participation in share release, and high security confidence in the proposed system.
arXiv Detail & Related papers (2025-10-09T18:02:40Z) - Blockchain-Based Secure Online Voting Platform Ensuring Voter Anonymity, Integrity, and End-to-End Verifiability [0.0]
This paper proposes a hybrid blockchain-based voting model that stores encrypted votes on a private blockchain maintained by election organizers and neutral observers.<n>The system issues voters one-time blind-signed tokens to protect anonymity, and provides receipts so they can confirm their vote.<n>This research highlights the feasibility of secure, verifiable, and scalable online voting for organizations ranging from small groups to larger institutions.
arXiv Detail & Related papers (2025-09-26T21:58:52Z) - Inference Attacks on Encrypted Online Voting via Traffic Analysis [19.653420340564946]
We examine how adversaries can exploit metadata from encrypted network traffic to uncover sensitive information during online voting.<n>Our analysis reveals that, even without accessing the content, it is possible to infer critical voter actions, such as whether a person votes, the exact moment a ballot is submitted, and whether the ballot is valid or spoiled.<n>We evaluate our attacks on two widely used online voting platforms, one proprietary and one partially open source, achieving classification accuracy as high as 99.5%.
arXiv Detail & Related papers (2025-09-19T07:14:01Z) - VoteMate: A Decentralized Application for Scalable Electronic Voting on EVM-Based Blockchain [1.7034813545878589]
A single vulnerability could be exploited to manipulate elections on a large scale.<n>System can be secure but may lack transparency and confidentiality.<n>Adding cryptographic layers can also ensure voter confidentiality.
arXiv Detail & Related papers (2025-05-21T17:50:18Z) - Efficient Lower Bounding of Single Transferable Vote Election Margins [56.12949230611067]
Single transferable vote (STV) is a system of preferential proportional voting employed in multi-seat elections.<n>The margin of victory, or simply'margin', is the smallest number of ballots that need to be manipulated to alter the set of winners.<n>Lower bounds on the margin can also be used for this purpose, in cases where exact margins are difficult to compute.
arXiv Detail & Related papers (2025-01-24T13:39:23Z) - Learning to Manipulate under Limited Information [44.99833362998488]
We trained over 100,000 neural networks of 26 sizes to manipulate against 8 different voting methods.<n>We find that some voting methods, such as Borda, are highly manipulable by networks with limited information, while others, such as Instant Runoff, are not.
arXiv Detail & Related papers (2024-01-29T18:49:50Z) - Private Multi-Winner Voting for Machine Learning [48.0093793427039]
We propose three new DP multi-winner mechanisms: Binary, $tau$, and Powerset voting.
Binary voting operates independently per label through composition.
$tau$ voting bounds votes optimally in their $ell$ norm for tight data-independent guarantees.
Powerset voting operates over the entire binary vector by viewing the possible outcomes as a power set.
arXiv Detail & Related papers (2022-11-23T20:06:46Z) - Having your Privacy Cake and Eating it Too: Platform-supported Auditing
of Social Media Algorithms for Public Interest [70.02478301291264]
Social media platforms curate access to information and opportunities, and so play a critical role in shaping public discourse.
Prior studies have used black-box methods to show that these algorithms can lead to biased or discriminatory outcomes.
We propose a new method for platform-supported auditing that can meet the goals of the proposed legislation.
arXiv Detail & Related papers (2022-07-18T17:32:35Z) - Secure Order Based Voting Using Distributed Tallying [5.407319151576265]
One of the main challenges in e-voting systems is to certify that the computed results are consistent with the cast ballots.<n>We propose a secure voting protocol for elections governed by order-based voting rules.<n>Our protocol, in which the tallying task is distributed among several independent talliers, offers perfect ballot secrecy.
arXiv Detail & Related papers (2022-05-21T12:17:21Z) - Obvious Manipulability of Voting Rules [105.35249497503527]
The Gibbard-Satterthwaite theorem states that no unanimous and non-dictatorial voting rule is strategyproof.
We revisit voting rules and consider a weaker notion of strategyproofness called not obvious manipulability.
arXiv Detail & Related papers (2021-11-03T02:41:48Z) - Private Reinforcement Learning with PAC and Regret Guarantees [69.4202374491817]
We design privacy preserving exploration policies for episodic reinforcement learning (RL)
We first provide a meaningful privacy formulation using the notion of joint differential privacy (JDP)
We then develop a private optimism-based learning algorithm that simultaneously achieves strong PAC and regret bounds, and enjoys a JDP guarantee.
arXiv Detail & Related papers (2020-09-18T20:18:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.