Paper published in a book (Scientific congresses, symposiums and conference proceedings)
“You Shall Not Abstain!” A Formal Study of Forced Participation
JAMROGA, Wojciech; ROENNE, Peter; KIM, Yanet al.
2024 • In Budurushi, Jurlind (Ed.) Financial Cryptography and Data Security. FC 2024 International Workshops - Voting, DeFI, WTSC, CoDecFin, Revised Selected Papers
[en] In this paper we revisit the idea of participation privacy in secure voting, i.e., when public data does not reveal whether a given voter participated in the election. This is an important property, especially when defining coercion-resistance preventing forced abstention attacks, and it is frequently mentioned as one of the main necessary conditions. However, what has been largely overlooked in the secure voting literature, is the idea of preventing forced participation attacks, i.e., where a voter is forced, or more subtly feels forced, to participate in an election. Whereas a high participation rate might seem like a desirable democratic property, there are cases when a part of the society wants to boycott the vote, e.g., in order to express its disapproval, or to prevent the proposed legislation. We logically formalise the idea of resistance to forced participation and, perhaps surprisingly, show that it is to some extent dual to forced abstention resistance. We also give intuitive examples of systems that satisfy one, but not the other.
Disciplines :
Computer science
Author, co-author :
JAMROGA, Wojciech ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust > APSIA > Team Peter RYAN ; Institute of Computer Science, Polish Academy of Science, Warsaw, Poland
ROENNE, Peter ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA
KIM, Yan ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA
RYAN, Peter Y A ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
External co-authors :
yes
Language :
English
Title :
“You Shall Not Abstain!” A Formal Study of Forced Participation
Publication date :
30 November 2024
Event name :
9th Workshop on Advances in Secure Electronic Voting Schemes (Voting 2024)
Event place :
Willemstad, Curaçao
Event date :
08-03-2024 => 08-03-2024
Main work title :
Financial Cryptography and Data Security. FC 2024 International Workshops - Voting, DeFI, WTSC, CoDecFin, Revised Selected Papers
Editor :
Budurushi, Jurlind
Publisher :
Springer Science and Business Media Deutschland GmbH
This research has been supported by NCBR Poland and FNR Luxembourg under the PolLux/FNR-CORE project SpaceVote (POLLUX-XI/14/SpaceVote/2023 and C22/IS/17232062/SpaceVote) and the FNR-CORE project PABLO (C21/IS/16326754/PABLO). For the purpose of open access, and in fulfilment of the obligations arising from the grant agreement, the authors have applied CC BY 4.0 license to any Author Accepted Manuscript version arising from this submission.
Aditya, R., Lee, B., Boyd, C., Dawson, E.: An efficient mixnet-based voting scheme providing receipt-freeness. In: Katsikas, S., Lopez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 152–161. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30079-3 16
Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS), pp. 100–109. IEEE Computer Society Press (1997)
Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. J. ACM 49, 672–713 (2002). https://doi.org/10.1145/585265.585270
Araújo, R., Ben Rajeb, N., Robbana, R., Traoré, J., Youssfi, S.: Towards practical and secure coercion-resistant electronic elections. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 278–297. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17619-7 20
Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 195–209. IEEE (2008)
Baskar, A., Ramanujam, R., Suresh, S.: Knowledge-based modelling of voting protocols. In: Proceedings of the 11th Conference on Theoretical Aspects of Rationality and Knowledge, pp. 62–71. ACM (2007)
BBC News: Tsvangirai rejects ‘sham’ ballot (2008). http://news.bbc.co.uk/2/hi/africa/7478399.stm
Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 544–553. ACM (1994)
Boureanu, I., Jones, A.V., Lomuscio, A.: Automatic verification of epistemic specifications under convergent equational theories. In: Proceedings of International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1141–1148 (2012)
Bruni, A., Drewsen, E., Schürmann, C.: Towards a mechanized proof of selene receipt-freeness and vote-privacy. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Schürmann, C. (eds.) E-Vote-ID 2017. LNCS, vol. 10615, pp. 110–126. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68687-5 7
Chadha, R., Kremer, S., Scedrov, A.: Formal analysis of multiparty contract signing. J. Autom. Reason. 36(1–2), 39–83 (2006)
Chaum, D., Ryan, P.Y.A., Schneider, S.: A practical voter-verifiable election scheme. In: di Vimercati, S.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 118–139. Springer, Heidelberg (2005). https://doi.org/10. 1007/11555827 8
Cortier, V., Galindo, D., Küsters, R., Müller, J., Truderung, T.: SoK: verifiability notions for e-voting protocols. In: IEEE Symposium on Security and Privacy, pp. 779–798 (2016). https://doi.org/10.1109/SP.2016.52
Cortier, V., Gaudry, P., Yang, Q.: Is the JCJ voting system really coercion-resistant? Cryptology ePrint Archive (2022)
Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: 19th IEEE Computer Security Foundations Workshop, pp. 12–pp. IEEE (2006)
Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols: a taster. In: Chaum, D., et al. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 289–309. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12980-3 18
Delaune, S., Kremer, S., Ryan, M.D.: Receipt-freeness: formal definition and fault attacks. In: Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy. Citeseer (2005)
Dreier, J., Lafourcade, P., Lakhnech, Y.: A formal taxonomy of privacy in voting protocols. In: 2012 IEEE International Conference on Communications (ICC), pp. 6710–6715. IEEE (2012)
Emerson, E.: Temporal and modal logic. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. B, pp. 995–1072. Elsevier (1990)
Estaji, E., Haines, T., Gjøsteen, K., Rønne, P.B., Ryan, P.Y.A., Soroush, N.: Revisiting practical and usable coercion-resistant remote e-voting. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 50–66. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60347-2 4
Ferree, K.E., Jung, D.F., Dowd, R.A., Gibson, C.C.: Election ink and turnout in a partial democracy. Br. J. Polit. Sci. 50(3), 1175–1191 (2020)
Gerhard, A.S.H., Atic, M., Letic, P., Erben, P.: Indelible Ink in Elections. White paper, IFES (2009). https://web.archive.org/web/20191108205514/https://www. ifes.org/sites/default/files/ifes gerhard atic letic erben white paper indelible ink in elections may 2019.pdf
Żaneta Gotowalska-Wróblewska: Jak nie brać udzia̷lu w referendum? [how not to take part in the referendum?] (2023). https://wiadomosci.wp.pl/nie-chcesz-wziac-udzialu-w-referendum-oto-co-powinienes-zrobic-6950661018536768a
van der Hoek, W., Wooldridge, M.: Cooperation, knowledge and time: alternating-time temporal epistemic logic and its applications. Stud. Logica 75(1), 125–157 (2003)
Horbaczewski, R.: Sad najwyższy odpowiedzia̷l, czy bedzie osobny spis wyborców na referendu (2023). https://www.prawo.pl/samorzad/odnotowanie-niepobrania-karty-referendalnej-przez-komisje,523420.html
Jamroga, W., Knapik, M., Kurpiewski, D.: Model checking the SELENE E-voting protocol in multi-agent logics. In: Krimmer, R., et al. (eds.) E-Vote-ID 2018. LNCS, vol. 11143, pp. 100–116. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00419-4 7
Jamroga, W., Mauw, S., Melissen, M.: Fairness in non-repudiation protocols. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 122–139. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29963-6 10
Jamroga, W., Kim, Y.: Practical model reductions for verification of multi-agent systems. In: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI, pp. 7135–7139. ijcai.org (2023). https://doi.org/10. 24963/IJCAI.2023/834
Jamroga, W., Kim, Y., Kurpiewski, D., Ryan, P.Y.A.: Towards model checking of voting protocols in Uppaal. In: Krimmer, R., et al. (eds.) E-Vote-ID 2020. LNCS, vol. 12455, pp. 129–146. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60347-2 9
Jamroga, W., Kurpiewski, D., Malvone, V.: Natural strategic abilities in voting protocols. In: Groß, T., Viganò, L. (eds.) STAST 2020. LNCS, vol. 12812, pp. 45–62. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-79318-0 3
Jaros, J.: Wieś boi sie bojkotu referendum. To bedzie tajemnica poliszynela [The countryside is afraid to boycott the referendum. It will be an open secret] (2023). https://kalisz.wyborcza.pl/kalisz/7,181359,30197487,tajemnica-wyborcza-fikcja-podczas-referendum-kobiety-o-przedwyborczych.html
Jha, P.S.: What a tiny spot of ink can mean. World Press Rev. 49(12) (2002). https://www.worldpress.org/Asia/801.cfm
Jonker, H.L., Pieters, W.: Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of IAVoSS Workshop On Trustworthy Elections (WOTE 2006). Robinson College (2006)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61–70. ACM (2005)
Kim, Y., Jamroga, W., Ryan, P.Y.A.: Verification of the socio-technical aspects of voting: the case of the Polish postal vote 2020. In: Proceedings of STAST (2022, to appear). https://arxiv.org/abs/2210.10694
King, L.: Taliban cut off Afghan voters’ ink-stained fingers, election observers say. Los Angeles Times (2009). https://www.latimes.com/archives/la-xpm-2009-aug-23-fg-afghan-election23-story.html
Kremer, S., Raskin, J.: Game analysis of abuse-free contract signing. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW 2002), pp. 206–220. IEEE Computer Society Press (2002). https://doi.org/10. 1109/CSFW.2002.1021817
Kremer, S., Raskin, J.F.: A game-based verification of non-repudiation and fair exchange protocols. J. Comput. Secur. 11(3) (2003). https://doi.org/10.1007/3-540-44685-0 37
Ku, W.C., Ho, C.M.: An e-voting scheme against bribe and coercion. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2004, pp. 113–116. IEEE (2004)
Kulyk, O., Teague, V., Volkamer, M.: Extending helios towards private eligibility verifiability. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 57–73. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22270-7 4
Kumar, R.K.: The business of ‘black-marking’ voters. The Hindu (2004). https://web.archive.org/web/20040412223708/http://www.hindu.com/2004/03/17/stories/2004031700571300.htm
Kurpiewski, D., et al.: Verification of multi-agent properties in electronic voting: a case study. In: Advances in Modal Logic, pp. 531–556. College Publications (2022)
Kusters, R., Truderung, T.: An epistemic approach to coercion-resistance for electronic voting protocols. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 251–266. IEEE (2009)
Küsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium, pp. 122–136. IEEE Computer Society (2010)
Lee, B., Kim, K.: Receipt-free electronic voting scheme with a tamper-resistant randomizer. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 389– 406. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36552-4 27
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing receipt-freeness in mixnet-based voting protocols. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 245–258. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24691-6 19
Magkos, E., Burmester, M., Chrissikopoulos, V.: Receipt-freeness in large-scale elections without untappable channels. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) I3E 2001. IIFIP, vol. 74, pp. 683–693. Springer, Boston, MA (2002). https://doi.org/10.1007/0-306-47009-8 50
Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696–701. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39799-8 48
Meng, B.: A critical review of receipt-freeness and coercion-resistance. Inf. Technol. J. 8(7), 934–964 (2009)
Michels, M., Horster, P.: Some remarks on a receipt-free and universally verifiable mix-type voting scheme. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 125–132. Springer, Heidelberg (1996). https://doi.org/10.1007/BFb0034841
Moran, T., Naor, M.: Receipt-free universally-verifiable voting with everlasting privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006). https://doi.org/10.1007/11818175 22
Notes from Poland: Exit poll: Polish government’s referendum invalidated by low turnout (2023). https://notesfrompoland.com/2023/10/15/exit-poll-polish-governments-referendum-invalidated-by-low-turnout/
Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25–35. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0028157
Państwowa Komisja Wyborcza [National Electoral Commission]: Obwieszczenie państwowej komisji wyborczej z dnia 17 października 2023 r. o wynikach g̷losowania i wyniku referendum przeprowadzonego w dniu 15 października 2023 r. (2023). https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU19970780483
Państwowa Komisja Wyborcza [National Electoral Commission]: Turnout in 2023 elections for sejm (2023). https://wybory.gov.pl/sejmsenat2023/en/frekwencja/pl
Państwowa Komisja Wyborcza [National Electoral Commission]: Turnout in nationwide referendum 2023 (2023). https://referendum.gov.pl/referendum2023/en/frekwencja/pl
Państwowa Komisja Wyborcza [National Electoral Commission]: Uchwa̷la nr 211/2023 pkw z dnia 25 września 2023 r. w sprawie wytycznych dla obwodowych komisji wyborczych dotyczacych zadań i trybu przygotowania oraz przeprowadzenia g̷losowania w obwodach g̷losowania utworzonych w kraju w wyborach do sejmu rzeczypospolitej polskiej i do senatu rzeczypospolitej polskiej oraz w referendum ogólnokrajowym zarzadzonych na dzień 15 października 2023 r. (2023). https://pkw.gov.pl/prawo-wyborcze/uchwaly-pkw/2023-r/uchwala-nr-2112023-pkw-z-dnia-25-wrzesnia-2023-r-w-sprawie-wytycznych-dla-obwodowych-komisji-wyborcz
Ryan, P.Y.A.: The computer ate my vote. In: Boca, P., Bowen, J., Siddiqi, J. (eds.) Formal Methods: State of the Art and New Directions, pp. 147–184. Springer, London (2010). https://doi.org/10.1007/978-1-84882-736-3 5
Ryan, P.Y.A., Rønne, P.B., Iovino, V.: Selene: voting with transparent verifiability and coercion-mitigation. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 176–192. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4 12
Ryan, P.Y.A., Schneider, S.A., Teague, V.: End-to-end verifiability in voting systems, from theory to practice. IEEE Secur. Priv. 13(3), 59–62 (2015). https://doi. org/10.1109/MSP.2015.54
Ryan, P.Y.A., Teague, V.: Pretty good democracy. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 111–130. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36213-2 15
Schläpfer, M., Haenni, R., Koenig, R., Spycher, O.: Efficient vote authorization in coercion-resistant internet voting. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 71–88. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32747-6 5
Sejm Rzeczypospolitej Polskiej [Parliament of the Republic of Poland]: Uchwa̷la sejmu rzeczypospolitej polskiej z dnia 17 sierpnia 2023 r. o zarzadzeniu referendum ogólnokrajowego w sprawach o szczególnym znaczeniu dla państwa (2023). https://isap.sejm.gov.pl/isap.nsf/download.xsp/WDU20230001636/O/D20231636.pdf
Sitnicka, D.: Najważniejsze sa wybory, referendum jest drugorzedne. pod-powiadamy, jak je bezpiecznie zbojkotować (2023). https://oko.press/referendum-bojkot-glosowanie
Tabatabaei, M., Jamroga, W., Ryan, P.Y.A.: Expressing receipt-freeness and coercion-resistance in logics of strategic ability: preliminary attempt. In: Proceedings of the 1st International Workshop on AI for Privacy and Security, PrAISe@ECAI 2016, pp. 1:1–1:8. ACM (2016). https://doi.org/10.1145/2970030. 2970039
Weber, S.G., Araujo, R., Buchmann, J.: On coercion-resistant electronic elections with linear work. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 908–916. IEEE (2007)
Wong, R.: Ink washout. The Star (2008). https://web.archive.org/web/20080430202643/http://www.thestar.com.my/election/story.asp?file=%2F2008 %2F3%2F5%2Felection2008%2F20540844&sec=Election2008&focus=1
Zollinger, M., Rønne, P.B., Ryan, P.Y.A.: Mechanized proofs of verifiability and privacy in a paper-based e-voting scheme. In: Proceedings of 5th Workshop on Advances in Secure Electronic Voting (2020)