Revisiting Silent Coercion
| dc.contributor.author | Chaum, David | |
| dc.contributor.author | Carback, Richard T. | |
| dc.contributor.author | Clark, Jeremy | |
| dc.contributor.author | Liu, Chao | |
| dc.contributor.author | Nejadgholi, Mahdi | |
| dc.contributor.author | Preneel, Bart | |
| dc.contributor.author | Sherman, Alan T. | |
| dc.contributor.author | Yaksetig, Mario | |
| dc.contributor.author | Yin, Zeyuan | |
| dc.contributor.author | Zagórski, Filip | |
| dc.contributor.author | Zhang, Bingsheng | |
| dc.date.accessioned | 2025-10-22T19:58:17Z | |
| dc.date.issued | 2025-09-11 | |
| dc.description | E-Vote-ID 2025, 10th International Joint Conference on Electronic Voting, Nancy, France, October 1–3, 2025 | |
| dc.description.abstract | We revisit “silent coercion” where an adversary gains access to a voter’s credential without the voter’s knowledge in an E2E verifiable, coercion-resistant Internet voting system. We argue that in this setting, casting an intended vote is impossible since the cryptographic backend can no longer distinguish the voter and adversary. However, we affirm that the voter can still act to nullify adversarial ballots, which is preferable to inaction. We provide a new instantiation of nullification using zero-knowledge proofs and multiparty computation, which improves on the efficiency of the current state-of-the-art. We also demonstrate an example voting system—VoteXX—that uses nullification. Our nullification protocol can complement new and existing techniques for coercion resistance (which all require voters to hide cryptographic keys from the coercer), providing a failsafe option for voters whose keys leak. | |
| dc.description.uri | https://link.springer.com/chapter/10.1007/978-3-032-05036-6_3 | |
| dc.format.extent | 17 pages | |
| dc.genre | conference papers and proceedings | |
| dc.genre | book chapters | |
| dc.identifier | doi:10.13016/m2ixen-v90s | |
| dc.identifier.citation | Chaum, David, Richard T. Carback, Jeremy Clark, et al. “Revisiting Silent Coercion.” In Electronic Voting, edited by David Duenas-Cid, Peter Roenne, Melanie Volkamer, et al. Springer Nature Switzerland, 2026. https://doi.org/10.1007/978-3-032-05036-6_3. | |
| dc.identifier.uri | https://doi.org/10.1007/978-3-032-05036-6_3 | |
| dc.identifier.uri | http://hdl.handle.net/11603/40567 | |
| dc.language.iso | en | |
| dc.publisher | Springer Nature | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
| dc.rights | Attribution 4.0 International | |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
| dc.subject | UMBC Cyber Defense Lab (CDL) | |
| dc.title | Revisiting Silent Coercion | |
| dc.type | Text | |
| dcterms.creator | https://orcid.org/0000-0002-5221-7549 | |
| dcterms.creator | https://orcid.org/0000-0003-1130-4678 |
Files
Original bundle
1 - 1 of 1
