User Tools

Site Tools


Proving Coercion-Resistance of Scantegrity II (BibTeX)

@INPROCEEDINGS{KuestersTruderungVogt-ICICS-2010,
  editor    = {Miguel Soriano and
               Sihan Qing and
               Javier L{\'o}pez},
  author = {Ralf K{\"u}sters and Tomasz Truderung and Andreas Vogt},
  title = {{Proving Coercion-Resistance of Scantegrity II}},
  booktitle = {Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010)},
  year = 2010,
  series    = {Lecture Notes in Computer Science},
  volume    = {6476},
 pages     = {281-295},
  publisher = {Springer},
  abstract = {By now, many voting protocols have been proposed that, among others, are designed to achieve coercion-resistance, i.e., resistance to vote buying and voter coercion. Scantegrity II is among the most prominent and successful such protocols in that it has been used in several elections. However, almost none of the modern voting protocols used in practice, including Scantegrity II, has undergone a rigorous cryptographic analysis. In this paper, we prove that Scantegrity II enjoys an optimal level of coercion-resistance, i.e., the same level of coercion-resistance as an ideal voting protocol (which merely reveals the outcome of the election), except for so-called forced abstention attacks. This result is obtained under the (necessary) assumption that the workstation used in the protocol is honest. Our analysis is based on a rigorous cryptographic definition of coercion-resistance we recently proposed. We argue that this definition is in fact the only existing cryptographic definition of coercion-resistance suitable for analyzing Scantegrity II. Our case study should encourage and facilitate rigorous cryptographic analysis of coercion-resistance also for other voting protocols used in practice.}
}