Natural Strategic Abilities in Voting Protocols

被引:1
|
作者
Jamroga, Wojciech [1 ,2 ]
Kurpiewski, Damian [2 ]
Malvone, Vadim [3 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, SnT, Luxembourg, Luxembourg
[2] Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
[3] Telecom Paris, Paris, France
关键词
Electronic voting; Coercion resistance; Natural strategies; Multi-agent models; Graded security; COMPLEXITY; SECURITY; PRIVACY;
D O I
10.1007/978-3-030-79318-0_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security properties are often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the property at hand. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks. Here, we propose a graded notion of security based on the complexity of the user's strategic behavior. More precisely, we suggest that the level to which a security property phi is satisfied can be defined in terms of (a) the complexity of the strategy that the voter needs to execute to make phi true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain., the higher the degree of security. We demonstrate how the idea works in a case study based on an electronic voting scenario. To this end, we model the vVote implementation of the Preta Voter voting protocol for coercion-resistant and voterverifiable elections. Then, we identify "natural" strategies for the voter to obtain receipt-freeness, and measure the voter's effort that they require.
引用
收藏
页码:45 / 62
页数:18
相关论文
共 50 条