Skip to Main content Skip to Navigation
New interface
Preprints, Working Papers, ...

Selene: Voting with Transparent Verifiability and Coercion-Mitigation

Peter Y. A. Ryan 1 Peter Rønne 2, 1 Vincenzo Iovino 1 
2 PESTO - Proof techniques for security protocols
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : End-to-end verifiable voting schemes typically involves voters handling an encrypted ballot in order to confirm that their vote is accurately included in the tally. While this may be technically valid, from a public acceptance standpoint is may be problematic: many voters may not really understand the purpose of the encrypted ballot and the various checks that they can perform. In this paper we take a different approach and revisit an old idea: to provide each voter with a private tracking number. Votes are posted on a bulletin board in the clear along with their associated tracking number. This is appealing in that it provides voters with a very simple, intuitive way to verify their vote, in the clear. However, there are obvious drawbacks: we must ensure that no two voters are assigned the same tracker and we need to keep the trackers private. In this paper, we propose a scheme that addresses both of these problems: we ensure that voters get unique trackers and we close off the coercer's window of opportunity by ensuring that the voters only learn their tracking numbers after votes have been posted. The resulting scheme provides receipt-freeness, and indeed a good level of coercion-resistance while also providesinga more immediately understandable form of verifiability. The cryptographyis under the bonnet as far as the voter is concerned. The basic scheme still has a problem in some contexts: if the coercer is himself a voter there is a chance that the coerced voter might light on the coercer's tracker, or the coercer simply claims that it is his. We argue that in many contexts this may be an acceptable threat when weighed against the more transparent verification provided by the scheme. Nonetheless, we describe some elaborations of the basic scheme to mitigate such threats.
Document type :
Preprints, Working Papers, ...
Complete list of metadata

Cited literature [31 references]  Display  Hide  Download
Contributor : Peter Rønne Connect in order to contact the contributor
Submitted on : Monday, December 14, 2015 - 10:04:58 PM
Last modification on : Friday, February 4, 2022 - 3:25:12 AM
Long-term archiving on: : Saturday, April 29, 2017 - 1:12:41 PM


Files produced by the author(s)


  • HAL Id : hal-01242690, version 1



Peter Y. A. Ryan, Peter Rønne, Vincenzo Iovino. Selene: Voting with Transparent Verifiability and Coercion-Mitigation. {date}. ⟨hal-01242690⟩



Record views


Files downloads