-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
rebuilding site Sat Mar 9 15:35:21 CET 2024
- Loading branch information
Showing
23 changed files
with
638 additions
and
88 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,129 @@ | ||
<!DOCTYPE html> | ||
<html> | ||
<head> | ||
<meta charset="utf-8"> | ||
<meta name="viewport" content="width=device-width, initial-scale=1.0"> | ||
|
||
<meta name="Author" content="Bryan Ford"> | ||
|
||
<title> | ||
E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting – Bryan Ford's Home Page | ||
</title> | ||
<link rel="shortcut icon" href="/img/favicon.ico" | ||
type="image/x-icon" /> | ||
|
||
|
||
|
||
</head> | ||
|
||
<body | ||
|
||
> | ||
|
||
<center> | ||
<table style="background:white;padding:1px;border-spacing:5px"> | ||
<tr><td style="text-align:center"> | ||
<font color=black> | ||
<a href="/"><font color=blue>Home</font></a> - | ||
<a href="/topics"><font color=blue>Topics</font></a> - | ||
<a href="/pub"><font color=blue>Papers</font></a> - | ||
<a href="/thesis"><font color=blue>Theses</font></a> - | ||
<a href="/post"><font color=blue>Blog</font></a> - | ||
<a href="/cv.pdf"><font color=blue>CV</font></a> - | ||
<a href="/album/"><font color=blue>Photos</font></a> - | ||
<a href="/funny/"><font color=blue>Funny</font></a> | ||
</font> | ||
</td></tr></table> | ||
</center> | ||
<p> | ||
|
||
|
||
|
||
|
||
<h1>E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting</h1> | ||
|
||
<p align="center"> | ||
<strong>Louis-Henri Merino, | ||
Alaleh Azhir, | ||
Haoqian Zhang, | ||
Simone Colombo, | ||
Bernhard Tellenbach, | ||
Vero Estrada-Galiñanes, | ||
Bryan Ford</strong><br/> | ||
To appear in | ||
<a href="https://sp2024.ieee-security.org">45th IEEE Symposium on Security and Privacy</a><br/> | ||
May 20-23, 2024 | ||
</p> | ||
|
||
<h3>Abstract:</h3> | ||
|
||
Online voting is attractive for convenience and accessibility, but is more | ||
susceptible to voter coercion and vote buying than in-person voting. One | ||
mitigation is to give voters fake voting credentials that they can yield to a | ||
coercer. Fake credentials appear identical to real ones, but cast votes that | ||
are silently omitted from the final tally. An important unanswered question is | ||
how ordinary voters perceive such a mitigation: whether they could understand | ||
and use fake credentials, and whether the coercion risks justify the costs of | ||
mitigation. We present the first systematic study of these questions, involving | ||
150 diverse individuals in the U.S. northeast. All participants “registered” | ||
and “voted” in a mock election: 120 were exposed to coercion resistance via | ||
fake credentials, the rest forming a control group. Of the 120 participants | ||
exposed to fake credentials, 96% understood their use. 53% reported that they | ||
would create fake credentials in a real-world voting scenario, given the | ||
opportunity. 10% mistakenly voted with a fake credential, however. 22% reported | ||
either personal experience with or direct knowledge of coercion or vote-buying | ||
incidents. These latter participants rated the coercion-resistant system | ||
essentially as trustworthy as in-person voting via hand-marked paper ballots. | ||
Of the 150 total participants to use the system, 87% successfully created their | ||
credentials without assistance. Therefore, 83% successfully created and | ||
properly used their credentials. Participants give a System Usability Scale | ||
score of 70.4 — 58th percentile across diverse system studies. Our findings | ||
appear to support the importance of the coercion problem in general, and the | ||
promise of fake credentials as a possible mitigation, but user error rates | ||
remain an important usability challenge for future work. | ||
|
||
|
||
<h3>Full paper: | ||
<i>coming soon</i> | ||
</h3> | ||
|
||
|
||
|
||
|
||
|
||
<br clear=all> | ||
<hr> | ||
<table style="width:100%;padding:10pt"><tr> | ||
|
||
<td align="left"> | ||
|
||
Topics: | ||
|
||
<a href="/topics/Security/">Security</a> | ||
|
||
<a href="/topics/Privacy/">Privacy</a> | ||
|
||
<a href="/topics/Cryptography/">Cryptography</a> | ||
|
||
<a href="/topics/Transparency/">Transparency</a> | ||
|
||
<a href="/topics/Identity/">Identity</a> | ||
|
||
<a href="/topics/Democracy/">Democracy</a> | ||
|
||
<a href="/topics/Voting/">Voting</a> | ||
|
||
<a href="/topics/Usability/">Usability</a> | ||
|
||
|
||
</td> | ||
|
||
<td align="right"> | ||
<a href="https://bford.info/">Bryan Ford</a> | ||
</td> | ||
|
||
</tr></table> | ||
|
||
|
||
</body> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.