Abstract | ||
---|---|---|
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems. |
Year | Venue | Keywords |
---|---|---|
2010 | Towards Trustworthy Elections | proposed end-to-end voting system,generic attack,coercion attack,e2e voting system,different attack,corrupt election official,end-to-end voting system |
Field | DocType | Volume |
Internet privacy,Political science,Anti-plurality voting,Voting,Computer security,Disapproval voting,ThreeBallot,Cardinal voting systems,Bullet voting,Bulletin board | Conference | 6000 |
ISSN | ISBN | Citations |
0302-9743 | 3-642-12979-X | 5 |
PageRank | References | Authors |
0.43 | 9 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
John Kelsey | 1 | 429 | 34.31 |
Andrew Regenscheid | 2 | 14 | 1.29 |
Tal Moran | 3 | 439 | 25.36 |
David Chaum | 4 | 5 | 0.43 |