Revisiting Silent Coercion

Department

Program

Citation of Original Publication

Chaum, David, Richard T. Carback, Jeremy Clark, et al. “Revisiting Silent Coercion.” In Electronic Voting, edited by David Duenas-Cid, Peter Roenne, Melanie Volkamer, et al. Springer Nature Switzerland, 2026. https://doi.org/10.1007/978-3-032-05036-6_3.

Rights

Attribution 4.0 International

Abstract

We revisit “silent coercion” where an adversary gains access to a voter’s credential without the voter’s knowledge in an E2E verifiable, coercion-resistant Internet voting system. We argue that in this setting, casting an intended vote is impossible since the cryptographic backend can no longer distinguish the voter and adversary. However, we affirm that the voter can still act to nullify adversarial ballots, which is preferable to inaction. We provide a new instantiation of nullification using zero-knowledge proofs and multiparty computation, which improves on the efficiency of the current state-of-the-art. We also demonstrate an example voting system—VoteXX—that uses nullification. Our nullification protocol can complement new and existing techniques for coercion resistance (which all require voters to hide cryptographic keys from the coercer), providing a failsafe option for voters whose keys leak.