2025 • In Haslhofer, Bernhard (Ed.) Financial Cryptography and Data Security. FC 2025 International Workshops - CoDecFin, FinTeAchin, VOTING, 2025, Revised Selected Papers
[en] Electronic voting schemes typically ensure ballot privacy by assuming that the decryption key is distributed among tallying authorities, preventing any single authority from decrypting a voter’s ballot. However, this assumption may fail in a fully dishonest environment where all tallying authorities collude to break ballot privacy. In this work, we introduce the notion of anamorphic voting, which enables voters to convey their true voting intention to an auditor while casting an (apparently) regular ballot. We present new cryptographic techniques demonstrating that several existing voting schemes can support anamorphic voting.
Disciplines :
Computer science
Author, co-author :
Giustolisi, Rosario; IT University of Copenhagen, Copenhagen, Denmark
RAKEEI, Mohammadamin ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust > IRiSC > Team Gabriele LENZINI
LENZINI, Gabriele ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > IRiSC
External co-authors :
yes
Language :
English
Title :
Anamorphic Voting: Ballot Freedom Against Dishonest Authorities
Publication date :
06 November 2025
Event name :
Financial Cryptography and Data Security. FC 2025 International Workshops
Event place :
Miyakojima, Jpn
Event date :
18-04-2025
Main work title :
Financial Cryptography and Data Security. FC 2025 International Workshops - CoDecFin, FinTeAchin, VOTING, 2025, Revised Selected Papers
Editor :
Haslhofer, Bernhard
Publisher :
Springer Science and Business Media Deutschland GmbH
Rakeei and Lenzini\u2019s research is supported by the ANR and FNR international project INTER/AN/20/14926102-\u201CSecure and Verifiable Electronic Testing and Assessment Systems\u201D (SEVERITAS).
Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.J., et al.: Electing a university president using open-audit voting: analysis of real-world use of Helios. EVT/WOTE 9(10), 10 (2009)
Benaloh, J., Naehrig, M., Pereira, O.: Reactive: rethinking effective approaches concerning trustees in verifiable elections. Cryptology ePrint Archive (2024)
Benaloh, J., Naehrig, M., Pereira, O., Wallach, D.S.: ElectionGuard: a cryptographic toolkit to enable verifiable elections. In: USENIX Security (2024)
Bernhard, D., Pereira, O., Warinschi, B.: How not to prove yourself: pitfalls of the Fiat-Shamir heuristic and applications to Helios. In: ASIACRYPT. Springer (2012)
Budurushi, J., Neumann, S., Olembo, M.M., Volkamer, M.: Pretty understandable democracy-a secure and understandable internet voting scheme. In: 2013 International Conference on Availability, Reliability and Security (2013)
Chevallier-Mames, B., Fouque, P.A., Pointcheval, D., Stern, J., Traoré, J.: On some incompatible properties of voting schemes. In: Towards Trustworthy Elections (2010)
Cortier, V., Galindo, D., Glondu, S., Izabachène, M.: Election verifiability for Helios under weaker trust assumptions. In: ESORICS, pp. 327–344. Springer (2014)
Cortier, V., Gaudry, P., Yang, Q.: How to fake zero-knowledge proofs, again. In: E-Vote-Id. Tal Tech Press (2020)
Cortier, V., Smyth, B.: Attacking and fixing Helios: an analysis of ballot secrecy. J. Comput. Secur. 21(1), 89–148 (2013)
Cortier, V., Gaudry, P., Yang, Q.: A toolbox for verifiable tally-hiding e-voting systems. In:. ESORICS, pp. 631–652 (2022)
Cortier, V., Gaudry, P., Yang, Q.: Is the JCJ voting system really coercion-resistant? In: CSF, pp. 186–200 (2024)
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985). https://doi.org/10. 1109/TIT.1985.1057074
Feldman, A.J., Benaloh, J.: On subliminal channels in encrypt-on-cast voting systems. EVT/WOTE 12(40), 186 (2009)
Finogina, T., Herranz, J., Roenne, P.B.: Expanding the toolbox: coercion and vote-selling at vote-casting revisited. E-Vote-ID (2024)
Grewal, G.S., Ryan, M.D., Bursuc, S., Ryan, P.Y.: Caveat coercitor: coercion-evidence in electronic voting. In: 2013 IEEE Symposium on Security and Privacy (2013)