Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)

Read original: arXiv:2407.13240 - Published 7/19/2024 by Marie-Laure Zollinger, Peter B. R{o}nne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga
Total Score

0

🏅

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper explores the user experience and trust in a verifiable receipt-free electronic voting system.
  • The researchers conducted a user study to understand how voters perceive the security, privacy, and usability of such a system.
  • The findings provide insights into the design considerations for developing trustworthy and accessible electronic voting solutions.

Plain English Explanation

The paper investigates how people feel about a new type of electronic voting system that doesn't give voters a physical receipt to verify their vote. Instead, the system provides digital verification that the vote was recorded correctly, without revealing the individual's choice.

The researchers wanted to understand if voters would trust this system and find it easy to use. They ran a user study where people tried out the voting process and shared their thoughts. The key findings suggest that clear communication about the security and privacy features is important for building voter confidence. The system should also be designed with accessibility in mind, so all citizens can participate easily and feel their vote is protected.

Overall, this work highlights the need to carefully consider the human factors when developing verifiable electronic voting systems that protect voter privacy and election integrity. The goal is to create voting solutions that people perceive as secure and private, so they have confidence in the democratic process.

Technical Explanation

The paper presents a user study on a verifiable receipt-free electronic voting system. The researchers recruited participants to try out the voting process and then interviewed them to understand their perceptions of the system's security, privacy, and usability.

The system uses cryptographic techniques to provide voters with digital verification that their vote was recorded correctly, without revealing their individual choice. This approach aims to address concerns about vote buying and coercion associated with paper receipts.

The user study found that clear explanations of the system's security and privacy features were important for building voter trust. Participants also emphasized the need for the system to be accessible and easy to use for all citizens. Specific design considerations included providing intuitive interactions, clear error messages, and accessibility options.

Overall, the findings suggest that user experience is a critical factor in the adoption and success of verifiable electronic voting systems. The researchers highlight the importance of incorporating human-centered design principles to create voting solutions that are both technically secure and perceived as trustworthy by the public.

Critical Analysis

The paper provides valuable insights into the user experience considerations for verifiable receipt-free electronic voting systems. However, it is important to note that the study was conducted with a relatively small and homogeneous sample of participants. Further research with more diverse populations and in different cultural and political contexts would be beneficial to validate and expand on the findings.

Additionally, the paper does not delve deeply into potential limitations or security vulnerabilities of the underlying cryptographic techniques used in the voting system. While the focus is on user perceptions, a more thorough technical analysis of the system's security properties would help readers better evaluate the tradeoffs and risks involved.

It would also be useful for the researchers to explore how the system's design and communication strategies could be adapted to address specific concerns, such as voter coercion or distrust in election authorities. Exploring these nuances could lead to more robust and inclusive voting solutions.

Conclusion

This paper offers important perspectives on the user experience and trust factors in verifiable receipt-free electronic voting systems. The findings highlight the need to prioritize security, privacy, and accessibility in the design of such systems to ensure they are perceived as trustworthy and inclusive by the general public.

By focusing on the human-centered aspects of electronic voting, the researchers provide valuable guidance for developing voting solutions that can strengthen democratic participation and confidence in the electoral process. However, further research and analysis of the technical and security implications would help readers gain a more comprehensive understanding of the trade-offs and potential risks involved.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🏅

Total Score

0

Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)

Marie-Laure Zollinger, Peter B. R{o}nne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga

Voting protocols seek to provide integrity and vote privacy in elections. To achieve integrity, procedures have been proposed allowing voters to verify their vote - however this impacts both the user experience and privacy. Especially, vote verification can lead to vote-buying or coercion, if an attacker can obtain documentation, i.e. a receipt, of the cast vote. Thus, some voting protocols go further and provide mechanisms to prevent such receipts. To be effective, this so-called receipt-freeness depends on voters being able to understand and use these mechanisms. In this paper, we present a study with 300 participants which aims to evaluate the voters' experience of the receipt-freeness procedures in the e-voting protocol Selene in the context of vote-buying. This actually constitutes the first user study dealing with vote-buying in e-voting. While the usability and trust factors were rated low in the experiments, we found a positive correlation between trust and understanding.

Read more

7/19/2024

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting
Total Score

0

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Gali~nanes, Bryan Ford

Online voting is attractive for convenience and accessibility, but is more susceptible to voter coercion and vote buying than in-person voting. One mitigation is to give voters fake voting credentials that they can yield to a coercer. Fake credentials appear identical to real ones, but cast votes that are silently omitted from the final tally. An important unanswered question is how ordinary voters perceive such a mitigation: whether they could understand and use fake credentials, and whether the coercion risks justify the costs of mitigation. We present the first systematic study of these questions, involving 150 diverse individuals in Boston, Massachusetts. All participants registered and voted in a mock election: 120 were exposed to coercion resistance via fake credentials, the rest forming a control group. Of the 120 participants exposed to fake credentials, 96% understood their use. 53% reported that they would create fake credentials in a real-world voting scenario, given the opportunity. 10% mistakenly voted with a fake credential, however. 22% reported either personal experience with or direct knowledge of coercion or vote-buying incidents. These latter participants rated the coercion-resistant system essentially as trustworthy as in-person voting via hand-marked paper ballots. Of the 150 total participants to use the system, 87% successfully created their credentials without assistance; 83% both successfully created and properly used their credentials. Participants give a System Usability Scale score of 70.4, which is slightly above the industry's average score of 68. Our findings appear to support the importance of the coercion problem in general, and the promise of fake credentials as a possible mitigation, but user error rates remain an important usability challenge for future work.

Read more

4/19/2024

🚀

Total Score

0

Publicly auditable privacy-preserving electoral rolls

Prashant Agrawal, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee

While existing literature on electronic voting has extensively addressed verifiability of voting protocols, the vulnerability of electoral rolls in large public elections remains a critical concern. To ensure integrity of electoral rolls, the current practice is to either make electoral rolls public or share them with the political parties. However, this enables construction of detailed voter profiles and selective targeting and manipulation of voters, thereby undermining the fundamental principle of free and fair elections. In this paper, we study the problem of designing publicly auditable yet privacy-preserving electoral rolls. We first formulate a threat model and provide formal security definitions. We then present a protocol for creation, maintenance and usage of electoral rolls that mitigates the threats. Eligible voters can verify their inclusion, whereas political parties and auditors can statistically audit the electoral roll. Further, the audit can also detect polling-day ballot stuffing and denials to eligible voters by malicious polling officers. The entire electoral roll is never revealed, which prevents any large-scale systematic voter targeting and manipulation.

Read more

6/4/2024

🔮

Total Score

0

Private Electronic Payments with Self-Custody and Zero-Knowledge Verified Reissuance

Daniele Friolo, Geoffrey Goodell, Dann Toliver, Hazem Danny Nakib

This article builds upon the protocol for digital transfers described by Goodell, Toliver, and Nakib, which combines privacy by design for consumers with strong compliance enforcement for recipients of payments and self-validating assets that carry their own verifiable provenance information. We extend the protocol to allow for the verification that reissued assets were created in accordance with rules prohibiting the creation of new assets by anyone but the issuer, without exposing information about the circumstances in which the assets were created that could be used to identify the payer. The modified protocol combines an audit log with zero-knowledge proofs, so that a consumer spending an asset can demonstrate that there exists a valid entry on the audit log that is associated with the asset, without specifying which entry it is. This property is important as a means to allow money to be reissued within the system without the involvement of system operators within the zone of control of the original issuer. Additionally, we identify a key property of privacy-respecting electronic payments, wherein the payer is not required to retain secrets arising from one transaction until the following transaction, and argue that this property is essential to framing security requirements for storage of digital assets and the risk of blackmail or coercion as a way to exfiltrate information about payment history. We claim that the design of our protocol strongly protects the anonymity of payers with respect to their payment transactions, while preventing the creation of assets by any party other than the original issuer without destroying assets of equal value.

Read more

9/4/2024