Skip to main content

Who Was that Masked Voter? The Tally Won’t Tell!

  • Conference paper
  • First Online:
Electronic Voting (E-Vote-ID 2021)

Abstract

We consider elections that publish anonymised voted ballots or anonymised cast-vote records for transparency or verification purposes, investigating the implications for privacy, coercion, and vote selling and exploring how partially masking the ballots can alleviate these issues.

Risk Limiting Tallies (RLT), which reveal only a random sample of ballots, were previously proposed to mitigate some coercion threats. Masking some ballots provides coerced voters with plausible deniability, while risk-limiting techniques ensure that the required confidence level in the election result is achieved. Risk-Limiting Verification (RLV) extended this approach to masking a random subset of receipts or trackers.

Here we show how these ideas can be generalised and made more flexible and effective by masking at a finer level of granularity: at the level of the components of ballots. In particular, we consider elections involving complex ballots, where RLT may be vulnerable to pattern-based vote buying. We propose various measures of verifiability and coercion-resistance and investigate how several sampling/masking strategies perform against these measures. Using methods from coding theory, we analyse signature attacks, bounding the number of voters who can be coerced. We also define new quantitative measures for the level of coercion-resistance without plausible deniability and the level of vote-buying-resistance without “free lunch” vote sellers.

These results and the different strategies for masking ballots are of general interest for elections that publish ballots for auditing, verification, or transparency purposes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Benaloh, J., Jones, D., Lazarus, E.L., Lindeman, M., Stark, P.B.: SOBA: Secrecy-preserving observable ballot-level audit. In: 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 11). USENIX Association, San Francisco, CA (2011). https://www.usenix.org/conference/evtwote-11/soba-secrecy-preserving-observable-ballot-level-audit

  2. Benaloh, J., Stark, P.B., Teague, V.J.: VAULT: Verifiable audits using limited transparency. In: Krimmer, R., Volkamer, M., Cortier, V., Beckert, B., Küsters, R., Serdült, U., Duenas-Cid, D. (eds.) Proceedings of E-Vote ID 2019. LNCS, vol. 11759. Springer, Chem (2019)

    Google Scholar 

  3. Bernhard, D., Cortier, V., Pereira, O., Warinschi, B.: Measuring vote privacy, revisited. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 941–952 (2012)

    Google Scholar 

  4. Jamroga, W., Roenne, P.B., Ryan, P.Y.A., Stark, P.B.: Risk-limiting tallies. In: Krimmer, R., et al. (eds.) E-Vote-ID 2019. LNCS, vol. 11759, pp. 183–199. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30625-0_12

    Chapter  Google Scholar 

  5. Küsters, R., Truderung, T., Vogt, A.: Verifiability, privacy, and coercion-resistance: new insights from a case study. In: 2011 IEEE Symposium on Security and Privacy, pp. 538–553. IEEE (2011)

    Google Scholar 

  6. Küsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion resistance and its applications. J. Comput. Secur. 20(6), 709–764 (2012). https://doi.org/10.3233/JCS-2012-0444

    Article  Google Scholar 

  7. Liedtke, J., Küsters, R., Müller, J., Rausch, D., Vogt, A.: Ordinos: a verifiable tally-hiding electronic voting protocol. In: IEEE 5th European Symposium on Security and Privacy (EuroS&P 2020) (2020)

    Google Scholar 

  8. Ryan, P.Y.A., Rønne, P.B., Iovino, V.: Selene: voting with transparent verifiability and coercion-mitigation. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 176–192. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_12

    Chapter  Google Scholar 

Download references

Acknowledgements

This research was funded in part by the Luxembourg National Research Fund (FNR) grant references STV C18/IS/12685695, Q-CoDe CORE17/IS/11689058 and PRIDE15/10621687/ SPsquared.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Peter Y. A. Ryan , Peter B. Roenne , Dimiter Ostrev , Fatima-Ezzahra El Orche , Najmeh Soroush or Philip B. Stark .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ryan, P.Y.A., Roenne, P.B., Ostrev, D., El Orche, FE., Soroush, N., Stark, P.B. (2021). Who Was that Masked Voter? The Tally Won’t Tell!. In: Krimmer, R., et al. Electronic Voting. E-Vote-ID 2021. Lecture Notes in Computer Science(), vol 12900. Springer, Cham. https://doi.org/10.1007/978-3-030-86942-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86942-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86941-0

  • Online ISBN: 978-3-030-86942-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics