Papers
Topics
Authors
Recent
Search
2000 character limit reached

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

Published 18 Apr 2024 in cs.HC and cs.CR | (2404.12075v1)

Abstract: Online voting is attractive for convenience and accessibility, but is more susceptible to voter coercion and vote buying than in-person voting. One mitigation is to give voters fake voting credentials that they can yield to a coercer. Fake credentials appear identical to real ones, but cast votes that are silently omitted from the final tally. An important unanswered question is how ordinary voters perceive such a mitigation: whether they could understand and use fake credentials, and whether the coercion risks justify the costs of mitigation. We present the first systematic study of these questions, involving 150 diverse individuals in Boston, Massachusetts. All participants "registered" and "voted" in a mock election: 120 were exposed to coercion resistance via fake credentials, the rest forming a control group. Of the 120 participants exposed to fake credentials, 96% understood their use. 53% reported that they would create fake credentials in a real-world voting scenario, given the opportunity. 10% mistakenly voted with a fake credential, however. 22% reported either personal experience with or direct knowledge of coercion or vote-buying incidents. These latter participants rated the coercion-resistant system essentially as trustworthy as in-person voting via hand-marked paper ballots. Of the 150 total participants to use the system, 87% successfully created their credentials without assistance; 83% both successfully created and properly used their credentials. Participants give a System Usability Scale score of 70.4, which is slightly above the industry's average score of 68. Our findings appear to support the importance of the coercion problem in general, and the promise of fake credentials as a possible mitigation, but user error rates remain an important usability challenge for future work.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (64)
  1. P.Ā Ehin, M.Ā Solvak, J.Ā Willemson, and P.Ā Vinkel, ā€œInternet voting in Estonia 2005–2019: Evidence from eleven elections,ā€ Government Information Quarterly, vol.Ā 39, no.Ā 4, p. 101718, Oct. 2022.
  2. P.Ā van den Besselaar, A.-M. Oostveen, F.Ā DeĀ Cindio, and D.Ā Ferrazzi, ā€œExperiments with E-Voting Technology: Experiences and Lessons,ā€ Social Science Research Network, Scholarly Paper 1433569, 2003.
  3. D.Ā Jefferson, A.Ā D. Rubin, B.Ā Simons, and D.Ā Wagner, ā€œA Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE),ā€ 2004.
  4. R.Ā Krimmer, D.Ā Duenas-Cid, and I.Ā Krivonosova, ā€œDebate: Safeguarding democracy during pandemics. Social distancing, postal, or internet voting—the good, the bad or the ugly?ā€ Public Money & Management, vol.Ā 41, no.Ā 1, pp. 8–10, Jan. 2021.
  5. J.Ā Benaloh, ā€œVerifiable Secret-Ballot Elections,ā€ Ph.D. dissertation, 1987.
  6. B.Ā Adida, ā€œHelios: Web-based Open-Audit Voting.ā€ in USENIX Security Symposium, vol.Ā 17, 2008, pp. 335–348.
  7. V.Ā Cortier, D.Ā Galindo, R.Ā Küsters, J.Ā Müller, and T.Ā Truderung, ā€œSoK: Verifiability Notions for E-Voting Protocols,ā€ in 2016 IEEE Symposium on Security and Privacy, 2016.
  8. R.Ā Küsters, J.Ā Liedtke, J.Ā Müller, D.Ā Rausch, and A.Ā Vogt, ā€œOrdinos: A Verifiable Tally-Hiding E-Voting System,ā€ in 2020 IEEE European Symposium on Security and Privacy, 2020.
  9. Y.-X. Kho, S.-H. Heng, and J.-J. Chin, ā€œA Review of Cryptographic Electronic Voting,ā€ Symmetry, vol.Ā 14, no.Ā 5, p. 858, May 2022.
  10. J.Ā Benaloh, ā€œBallot Casting Assurance via Voter-Initiated Poll Station Auditing,ā€ in 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, Boston, MA, Aug. 2007.
  11. V.Ā Cortier, A.Ā Debant, P.Ā Gaudry, and S.Ā Glondu, ā€œBelenios with cast as intended,ā€ in Voting 2023 - 8th Workshop on Advances in Secure Electronic Voting, May 2023.
  12. A.Ā Juels, D.Ā Catalano, and M.Ā Jakobsson, ā€œCoercion-Resistant Electronic Elections,ā€ in Towards Trustworthy Elections: New Directions in Electronic Voting, Berlin, Heidelberg, 2010, pp. 37–63.
  13. J.Ā Benaloh and D.Ā Tuinstra, ā€œReceipt-free secret-ballot elections,ā€ ser. STOC ’94, May 1994.
  14. S.Ā Park, M.Ā Specter, N.Ā Narula, and R.Ā L. Rivest, ā€œGoing from bad to worse: From Internet voting to blockchain voting,ā€ Journal of Cybersecurity, vol.Ā 7, no.Ā 1, Feb. 2021.
  15. P.Ā Daian, T.Ā Kell, I.Ā Miers, and A.Ā Juels, ā€œOn-Chain Vote Buying and the Rise of Dark DAOs,ā€ Jul. 2018.
  16. R.Ā Küsters, T.Ā Truderung, and A.Ā Vogt, ā€œA Game-Based Definition of Coercion-Resistance and Its Applications,ā€ in 23rd IEEE Computer Security Foundations Symposium, 2010, pp. 122–136.
  17. ā€œProtocol of the Swiss Post Voting System: Computational Proof of Complete Verifiability and Privacy,ā€ Tech. Rep. 1.0.0, 2021.
  18. S.Ā Bell, J.Ā Benaloh, M.Ā D. Byrne, D.Ā Debeauvoir, B.Ā Eakin, P.Ā Kortum, N.Ā McBurnett, O.Ā Pereira, P.Ā B. Stark, D.Ā S. Wallach, G.Ā Fisher, J.Ā Montoya, M.Ā Parker, and M.Ā Winn, ā€œSTAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System,ā€ in 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections.
  19. D.Ā Achenbach, C.Ā Kempka, B.Ā Lƶwe, and J.Ā Müller-Quade, ā€œImproved Coercion-Resistant Electronic Elections through Deniable Re-Voting,ā€ in USENIX Journal of Election Technology and Systems, 2015.
  20. K.Ā Krips and J.Ā Willemson, ā€œOn Practical Aspects of Coercion-Resistant Remote Voting Systems,ā€ in E-Vote-ID 2019: Electronic Voting, 2019, pp. 216–232.
  21. W.Ā Lueks, I.Ā Querejeta-Azurmendi, and C.Ā Troncoso, ā€œVoteAgain: A scalable coercion-resistant voting system,ā€ in 29th USENIX Security Symposium, 2020, pp. 1553–1570.
  22. O.Ā Kulyk and S.Ā Neumann, ā€œHuman Factors in Coercion Resistant Internet Voting–A Review of Existing Solutions and Open Challenges,ā€ in Proceedings of the Fifth International Joint Conference on Electronic Voting.Ā Ā Ā TalTech press, 2020, p. 189.
  23. D.Ā Springall, T.Ā Finkenauer, Z.Ā Durumeric, J.Ā Kitcat, H.Ā Hursti, M.Ā MacAlpine, and J.Ā A. Halderman, ā€œSecurity Analysis of the Estonian Internet Voting System,ā€ in ACM SIGSAC Conference on Computer and Communications Security, 2014.
  24. S.Ā Neumann and M.Ā Volkamer, ā€œCivitas and the Real World: Problems and Solutions from a Practical Point of View,ā€ in Seventh Conference on Availability, Reliability and Security, 2012.
  25. E.Ā Estaji, T.Ā Haines, K.Ā GjĆøsteen, P.Ā B. RĆønne, P.Ā Y.Ā A. Ryan, and N.Ā Soroush, ā€œRevisiting Practical and Usable Coercion-Resistant Remote E-Voting,ā€ in E-Vote-ID 2020: Electronic Voting, 2020.
  26. A.Ā S. Neto, M.Ā Leite, R.Ā AraĆŗjo, M.Ā P. Mota, N.Ā C.Ā S. Neto, and J.Ā TraorĆ©, ā€œUsability Considerations For Coercion-Resistant Election Systems,ā€ in Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, ser. IHC 2018, Oct. 2018, pp. 1–10.
  27. L.-H. Merino, S.Ā Colombo, R.Ā Reyes, A.Ā Azhir, H.Ā Zhang, J.Ā Allen, B.Ā Tellenbach, V.Ā Estrada-GaliƱanes, and B.Ā Ford, ā€œTRIP: Trust-Limited Coercion-Resistant In-Person Voter Registration.ā€ [Online]. Available: https://arxiv.org/abs/2202.06692
  28. D.Ā Chaum, R.Ā T. Carback, J.Ā Clark, C.Ā Liu, M.Ā Nejadgholi, B.Ā Preneel, A.Ā T. Sherman, M.Ā Yaksetig, and F.Ā Zagorski, ā€œVoteXX: A Remote Voting System that is Coercion Resistant,ā€ Oct. 2020.
  29. M.Ā Backes, M.Ā GagnĆ©, and M.Ā Skoruppa, ā€œUsing mobile device communication to strengthen e-Voting protocols,ā€ in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, 2013.
  30. T.Ā Krivoruchko, ā€œRobust Coercion-Resistant Registration for Remote E-voting,ā€ in Proceedings of the IAVoSS Workshop on Trustworthy Elections, 2007.
  31. O.Ā Spycher, R.Ā Koenig, R.Ā Haenni, and M.Ā SchlƤpfer, ā€œA New Approach towards Coercion-Resistant Remote E-Voting in Linear Time,ā€ in Proceedings of the 15th International Conference on Financial Cryptography and Data Security, 2011, pp. 182–189.
  32. R.Ā AraĆŗjo, S.Ā Foulle, and J.Ā TraorĆ©, ā€œA Practical and Secure Coercion-Resistant Scheme for Internet Voting,ā€ in Towards Trustworthy Elections: New Directions in Electronic Voting, 2010.
  33. J.Ā Benaloh, T.Ā Moran, L.Ā Naish, K.Ā Ramchen, and V.Ā Teague, ā€œShuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting,ā€ IEEE Transactions on Information Forensics and Security, 2009.
  34. S.Ā G. Weber, R.Ā Araujo, and J.Ā Buchmann, ā€œOn Coercion-Resistant Electronic Elections with Linear Work,ā€ in The Second Conference on Availability, Reliability and Security, 2007.
  35. M.Ā Bernhard, A.Ā McDonald, H.Ā Meng, J.Ā Hwa, N.Ā Bajaj, K.Ā Chang, and J.Ā A. Halderman, ā€œCan Voters Detect Malicious Manipulation of Ballot Marking Devices?ā€ in 2020 IEEE Symposium on Security and Privacy, May 2020, pp. 679–694.
  36. J.Ā Brooke, ā€œSUS: A ā€˜Quick and Dirty’ Usability Scale,ā€ in Usability Evaluation In Industry.Ā Ā Ā CRC Press, 1996.
  37. B.Ā Laugwitz, T.Ā Held, and M.Ā Schrepp, ā€œConstruction and evaluation of a user experience questionnaire,ā€ in Symposium of the Austrian HCI and Usability Engineering Group.Ā Ā Ā Springer, 2008, pp. 63–76.
  38. A.Ā Hinderks, M.Ā Schrepp, F.Ā J. DomĆ­nguezĀ Mayo, M.Ā J. Escalona, and J.Ā Thomaschewski, ā€œDeveloping a UX KPI based on the user experience questionnaire,ā€ Computer Standards & Interfaces, 2019.
  39. J.Ā Kjeldskov and M.Ā B. Skov, ā€œStudying Usability In Sitro: Simulating Real World Phenomena in Controlled Environments,ā€ International Journal of Human–Computer Interaction, 2007.
  40. R.Ā Ploetzner, S.Ā Berney, and M.Ā BĆ©trancourt, ā€œWhen learning from animations is more successful than learning from static pictures: Learning the specifics of change,ā€ Instructional Science, 2021.
  41. S.Ā Türkay, ā€œThe effects of whiteboard animations on retention and subjective experiences when learning advanced physics topics,ā€ Computers & Education, vol.Ā 98, pp. 102–114, Jul. 2016.
  42. R.Ā E. Mayer, L.Ā Fiorella, and A.Ā Stull, ā€œFive ways to increase the effectiveness of instructional video,ā€ Educational Technology Research and Development, vol.Ā 68, no.Ā 3, pp. 837–852, Jun. 2020.
  43. R.Ā Likert, ā€œA technique for the measurement of attitudes.ā€ Archives of Psychology, vol. 22 140, pp. 55–55, 1932.
  44. ā€œFour people plead guilty in North Carolina ballot probe of 2016 and 2018 elections,ā€ NBC News, 2022.
  45. ā€œVerifier - Verified Voting 2024,ā€ https://verifiedvoting.org/verifier/.
  46. S.Ā Atske, ā€œPew Research Center - The voting experience in 2020,ā€ Nov. 2020.
  47. C.Ā Z. Acemyan, P.Ā Kortum, M.Ā D. Byrne, and D.Ā S. Wallach, ā€œUsability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, PrĆŖt Ć  Voter, and Scantegrity II,ā€ vol.Ā 2, no.Ā 3, 2014.
  48. P.Ā Y.Ā A. Ryan, D.Ā Bismark, J.Ā Heather, S.Ā Schneider, and Z.Ā Xia, ā€œPrÊt ƀ Voter: A Voter-Verifiable Voting System,ā€ IEEE Transactions on Information Forensics and Security, vol.Ā 4, no.Ā 4, pp. 662–673, 2009.
  49. D.Ā Chaum, R.Ā Carback, J.Ā Clark, A.Ā Essex, S.Ā Popoveniuc, R.Ā L. Rivest, P.Ā Y.Ā A. Ryan, E.Ā Shen, and A.Ā T. Sherman, ā€œScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes,ā€ IEEE Transactions on Information Forensics and Security, vol.Ā 4, no.Ā 4, pp. 611–627, Dec. 2009.
  50. C.Ā Z. Acemyan, P.Ā Kortum, M.Ā D. Byrne, and D.Ā S. Wallach, ā€œSummative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use,ā€ Human Factors, pp. 866–889, Aug. 2022.
  51. NIST, ā€œVoluntary Voting System Guidelines Version 2.0,ā€ Tech. Rep., Feb. 2021.
  52. ——, ā€œUsability Performance Benchmarks For the Voluntary Voting System Guidelines,ā€ Tech. Rep., Aug. 2007.
  53. A.Ā Bangor, P.Ā Kortum, and J.Ā Miller, ā€œDetermining what individual SUS scores mean: Adding an adjective rating scale,ā€ Journal of Usability Studies, vol.Ā 4, no.Ā 3, pp. 114–123, 2009.
  54. M.Ā Schrepp, ā€œUser Experience Questionnaire Handbook Version 10.ā€
  55. K.Ā Marky, M.Ā Schmitz, F.Ā Lange, and M.Ā MühlhƤuser, ā€œUsability of Code Voting Modalities,ā€ in Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019.
  56. P.Ā Y.Ā A. Ryan and V.Ā Teague, ā€œPretty Good Democracy,ā€ in Security Protocols XVII, 2013.
  57. A.Ā S. Brown, E.Ā Bracken, S.Ā Zoccoli, and K.Ā Douglas, ā€œGenerating and remembering passwords,ā€ Applied Cognitive Psychology, vol.Ā 18, no.Ā 6, pp. 641–651, 2004.
  58. R.Ā Dhamija and A.Ā Perrig, ā€œDeja Vu: A User Study Using Images for Authentication,ā€ in 9th USENIX Security Symposium (USENIX Security 00), 2000.
  59. D.Ā Khader, Q.Ā Tang, and P.Ā Y. Ryan, ā€œProving prĆŖt Ć  voter receipt free using computational security models,ā€ in 2013 Electronic Voting Technology Workshop, 2013.
  60. S.Ā Neumann, C.Ā Feier, M.Ā Volkamer, and R.Ā Koenig, ā€œTowards a practical JCJ/Civitas implementation,ā€ in Informatik Angepasst an Mensch, Organisation Und Umwelt, 2013.
  61. M.Ā R. Clarkson, S.Ā Chong, and A.Ā C. Myers, ā€œCivitas: Toward a Secure Voting System,ā€ in 2008 IEEE Symposium on Security and Privacy, May 2008, pp. 354–368.
  62. V.Ā Distler, M.-L. Zollinger, C.Ā Lallemand, P.Ā B. Roenne, P.Ā Y.Ā A. Ryan, and V.Ā Koenig, ā€œSecurity - Visible, Yet Unseen?ā€ 2019.
  63. P.Ā B. Stark, ā€œThere is no Reliable Way to Detect Hacked Ballot-Marking Devices,ā€ Election Law Journal Rules, Politics and Policy, vol.Ā 19, no.Ā 3, 2019.
  64. A.Ā W. Appel, R.Ā A. DeMillo, and P.Ā B. Stark, ā€œBallot-Marking Devices Cannot Ensure the Will of the Voters,ā€ Election Law Journal: Rules, Politics, and Policy, vol.Ā 19, no.Ā 3, pp. 432–450, Sep. 2020.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.