Vis enkel innførsel

dc.contributor.authorEstaji, Ehsan
dc.contributor.authorHaines, Thomas Edmund
dc.contributor.authorGjøsteen, Kristian
dc.contributor.authorRyan, Peter Y. A.
dc.date.accessioned2021-09-06T10:50:56Z
dc.date.available2021-09-06T10:50:56Z
dc.date.created2021-01-11T11:12:05Z
dc.date.issued2020
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2773712
dc.description.abstractIn this paper we revisit the seminal coercion-resistant e-voting protocol by Juels, Catalano and Jakobsson (JCJ) and in particular the attempts to make it usable and practical. In JCJ the user needs to handle cryptographic credentials and be able to fake these in case of coercion. In a series of three papers Neumann et al. analysed the usability of JCJ, and constructed and implemented a practical credential handling system using a smart card which unlock the true credential via a PIN code, respectively fake the credential via faking the PIN. We present several attacks and problems with the security of this protocol, especially an attack on coercion-resistance due to information leakage from the removal of duplicate ballots. Another problem, already stressed but not solved by Neumann et al, is that PIN typos happen frequently and would invalidate the cast vote without the voter being able to detect this. We construct different protocols which repair these problems. Further, the smart card is a trusted component which can invalidate cast votes without detection and can be removed by a coercer to force abstention, i.e. presenting a single point of failure. Hence we choose to make the protocols hardware-flexible i.e. also allowing the credentials to be store by ordinary means, but still being PIN based and providing PIN error resilience. Finally, one of the protocols has a linear tally complexity to ensure an efficient scheme also with many voters .en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleRevisiting Practical and Usable Coercion-Resistant Remote E-Votingen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doi10.1007/978-3-030-60347-2_4
dc.identifier.cristin1868744
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an articleen_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel