Revisiting Silent Coercion

dc.contributor.authorChaum, David
dc.contributor.authorCarback, Richard T.
dc.contributor.authorClark, Jeremy
dc.contributor.authorLiu, Chao
dc.contributor.authorNejadgholi, Mahdi
dc.contributor.authorPreneel, Bart
dc.contributor.authorSherman, Alan T.
dc.contributor.authorYaksetig, Mario
dc.contributor.authorYin, Zeyuan
dc.contributor.authorZagórski, Filip
dc.contributor.authorZhang, Bingsheng
dc.date.accessioned2025-10-22T19:58:17Z
dc.date.issued2025-09-11
dc.descriptionE-Vote-ID 2025, 10th International Joint Conference on Electronic Voting, Nancy, France, October 1–3, 2025
dc.description.abstractWe revisit “silent coercion” where an adversary gains access to a voter’s credential without the voter’s knowledge in an E2E verifiable, coercion-resistant Internet voting system. We argue that in this setting, casting an intended vote is impossible since the cryptographic backend can no longer distinguish the voter and adversary. However, we affirm that the voter can still act to nullify adversarial ballots, which is preferable to inaction. We provide a new instantiation of nullification using zero-knowledge proofs and multiparty computation, which improves on the efficiency of the current state-of-the-art. We also demonstrate an example voting system—VoteXX—that uses nullification. Our nullification protocol can complement new and existing techniques for coercion resistance (which all require voters to hide cryptographic keys from the coercer), providing a failsafe option for voters whose keys leak.
dc.description.urihttps://link.springer.com/chapter/10.1007/978-3-032-05036-6_3
dc.format.extent17 pages
dc.genreconference papers and proceedings
dc.genrebook chapters
dc.identifierdoi:10.13016/m2ixen-v90s
dc.identifier.citationChaum, David, Richard T. Carback, Jeremy Clark, et al. “Revisiting Silent Coercion.” In Electronic Voting, edited by David Duenas-Cid, Peter Roenne, Melanie Volkamer, et al. Springer Nature Switzerland, 2026. https://doi.org/10.1007/978-3-032-05036-6_3.
dc.identifier.urihttps://doi.org/10.1007/978-3-032-05036-6_3
dc.identifier.urihttp://hdl.handle.net/11603/40567
dc.language.isoen
dc.publisherSpringer Nature
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.rightsAttribution 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subjectUMBC Cyber Defense Lab (CDL)
dc.titleRevisiting Silent Coercion
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0002-5221-7549
dcterms.creatorhttps://orcid.org/0000-0003-1130-4678

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
9783032050366.pdf
Size:
481.22 KB
Format:
Adobe Portable Document Format