{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:41:02Z","timestamp":1776102062482,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031159107","type":"print"},{"value":"9783031159114","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:00:00Z","timestamp":1662163200000},"content-version":"vor","delay-in-days":245,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Researchers advocate for end-to-end verifiable voting schemes to maximise election integrity. At E-Vote-ID 2021, Kulyk et al. proposed to extend the verifiable scheme used in Switzerland (called original scheme) by voting codes to improve it with respect to vote secrecy. While the authors evaluated the general usability of their proposal, they did not evaluate its efficacy with respect to manipulation detection by voters. To close this gap, we conducted a corresponding user study. Furthermore, we study the effect of a video intervention (describing the vote casting process including individual verifiabilty steps) on the manipulation detection rate. We found that 65% of those receiving the video detected the manipulation and informed the support. If we only consider those who stated they (partially) watched the video the rate is 75%. The detection rate for those not having provided the video is 63%. While these rates are significantly higher than the 10% detection rate reported in related work for the original system, we discuss how to further increase the detection rate.\n<\/jats:p>","DOI":"10.1007\/978-3-031-15911-4_9","type":"book-chapter","created":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T14:04:29Z","timestamp":1662127469000},"page":"139-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Individual Verifiability with\u00a0Return Codes: Manipulation Detection Efficacy"],"prefix":"10.1007","author":[{"given":"Paul Tim","family":"Th\u00fcrw\u00e4chter","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Oksana","family":"Kulyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,3]]},"reference":[{"issue":"3","key":"9_CR1","first-page":"26","volume":"2","author":"CZ Acemyan","year":"2014","unstructured":"Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: Usability of voter verifiable, end-to-end voting systems: baseline data for Helios, Pr\u00eat \u00e0 Voter, and Scantegrity II. USENIX J. Election Technol. Syst. 2(3), 26\u201356 (2014)","journal-title":"USENIX J. Election Technol. Syst."},{"issue":"2","key":"9_CR2","first-page":"1","volume":"3","author":"CZ Acemyan","year":"2015","unstructured":"Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: From error to error: why voters could not cast a ballot and verify their vote with Helios, Pr\u00eat \u00e0 Voter, and Scantegrity II. USENIX J. Election Technol. Syst. 3(2), 1\u201319 (2015)","journal-title":"USENIX J. Election Technol. Syst."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: Summative usability assessments of STAR-Vote: a cryptographically secure e2e voting system that has been empirically proven to be easy to use. Hum. Factors 64, 1\u201324 (2018)","DOI":"10.1177\/0018720818812586"},{"key":"9_CR4","unstructured":"B\u00e4r, M., Henrich, C., M\u00fcller-Quade, J., R\u00f6hrich, S., St\u00fcber, C.: Real world experiences with bingo voting and a comparison of usability. In: EVT\/WOTE (2008)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Bernhard, M., et al.: Can voters detect malicious manipulation of ballot marking devices? In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 679\u2013694. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00118"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Budurushi, J., Neumann, S., Olembo, M.M., Volkamer, M.: Pretty understandable democracy - a secure and understandable internet voting scheme. In: ARES, pp. 198\u2013207 (2013)","DOI":"10.1109\/ARES.2013.27"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Budurushi, J., Renaud, K., Volkamer, M., Woide, M.: An investigation into the usability of electronic voting systems for complex elections. Ann. Telecommun. 71(7\u20138), 309\u2013322 (2016)","DOI":"10.1007\/s12243-016-0510-2"},{"key":"9_CR8","unstructured":"Chaum, D.: SureVote: technical overview. In: Proceedings of the Workshop on Trustworthy Elections (WOTE 2001) (2001)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Distler, V., Zollinger, M.L., Lallemand, C., Roenne, P., Ryan, P., Koenig, V.: Security-visible, yet unseen? How displaying security mechanisms impacts user experience and perceived security. In: ACM CHI, pp. 605:1\u2013605:13 (2019)","DOI":"10.1145\/3290605.3300835"},{"issue":"4","key":"9_CR10","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10209-011-0253-9","volume":"11","author":"KS Fuglerud","year":"2012","unstructured":"Fuglerud, K.S., R\u00f8ssvoll, T.H.: An evaluation of web-based voting usability and accessibility. Univ. Access Inf. Soc. 11(4), 359\u2013373 (2012)","journal-title":"Univ. Access Inf. Soc."},{"issue":"7\u20138","key":"9_CR11","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s12243-016-0509-8","volume":"71","author":"K Gj\u00f8steen","year":"2016","unstructured":"Gj\u00f8steen, K., Lund, A.S.: An experiment on the security of the Norwegian electronic voting protocol. Ann. Telecommun. 71(7\u20138), 299\u2013307 (2016)","journal-title":"Ann. Telecommun."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Haines, T., Lewis, S.J., Pereira, O., Teague, V.: How not to prove your election outcome. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 644\u2013660. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00048"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-540-77493-8_15","volume-title":"E-Voting and Identity","author":"J Helbach","year":"2007","unstructured":"Helbach, J., Schwenk, J.: Secure internet voting with code sheets. In: Alkassar, A., Volkamer, M. (eds.) Vote-ID 2007. LNCS, vol. 4896, pp. 166\u2013177. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77493-8_15"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-04135-8_7","volume-title":"E-Voting and Identity","author":"R Joaquim","year":"2009","unstructured":"Joaquim, R., Ribeiro, C., Ferreira, P.: VeryVote: a voter verifiable code voting system. In: Ryan, P.Y.A., Schoenmakers, B. (eds.) Vote-ID 2009. LNCS, vol. 5767, pp. 106\u2013121. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04135-8_7"},{"key":"9_CR15","unstructured":"Karayumak, F., Olembo, M.M., Kauer, M., Volkamer, M.: Usability analysis of Helios-an open source verifiable remote electronic voting system. In: EVT\/WOTE. USENIX (2011)"},{"key":"9_CR16","unstructured":"Kulyk, O., Ludwig, J., Volkamer, M., Koenig, R.E., Locher, P.: Usable verifiable secrecy-preserving e-voting. In: Electronic Voting: 6th International Joint Conference, E-Vote-ID. University of Tartu Press (2021)"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2017.70","volume":"15","author":"O Kulyk","year":"2017","unstructured":"Kulyk, O., Neumann, S., Budurushi, J., Volkamer, M.: Nothing comes for free: how much usability can you sacrifice for security? IEEE Secur. Priv. 15(3), 24\u201329 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-030-54455-3_21","volume-title":"Financial Cryptography and Data Security","author":"O Kulyk","year":"2020","unstructured":"Kulyk, O., Volkamer, M., M\u00fcller, M., Renaud, K.: Towards improving the efficacy of code-based verification in internet voting. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 291\u2013309. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_21"},{"key":"9_CR19","unstructured":"MacNamara, D., Gibson, P., Oakley, K.: A preliminary study on a DualVote and Pr\u00eat \u00e0 voter hybrid system. In: CeDEM, p. 77 (2012)"},{"key":"9_CR20","unstructured":"MacNamara, D., Scully, T., Gibson, P.: DualVote addressing usability and verifiability issues in electronic voting systems (2011). http:\/\/www-public.it-sudparis.eu\/~gibson\/Research\/Publications\/E-Copies\/MacNamaraSGCOQ11.pdf. Accessed 12 May 2022"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-030-86942-7_11","volume-title":"Electronic Voting","author":"M-L Zollinger","year":"2021","unstructured":"Zollinger, M.-L., Estaji, E., Ryan, P.Y.A., Marky, K.: \u201cJust for the Sake of Transparency\u2019\u2019: exploring voter mental models of\u00a0verifiability. In: Krimmer, R., et al. (eds.) E-Vote-ID 2021. LNCS, vol. 12900, pp. 155\u2013170. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86942-7_11"},{"key":"9_CR22","unstructured":"Marky, K., Kulyk, O., Renaud, K., Volkamer, M.: What did I really vote for? In: ACM CHI, p. 176 (2018)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Marky, K., Schmitz, M., Lange, F., M\u00fchlh\u00e4user, M.: Usability of code voting modalities. In: ACM CHI (2019)","DOI":"10.1145\/3290607.3312971"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Marky, K., Zollinger, M.L., Roenne, P., Ryan, P.Y., Grube, T., Kunze, K.: Investigating usability and user experience of individually verifiable internet voting schemes. ACM Trans. Comput.-Hum. Interact 28(5), 1\u201336 (2021)","DOI":"10.1145\/3459604"},{"key":"9_CR25","unstructured":"McDonald, J.H.: Handbook of Biological Statistics, vol. 2. Sparky House Publishing, Baltimore (2009)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Oostveen, A.M., Van den Besselaar, P.: Users\u2019 experiences with e-voting: a comparative case study. J. Electron. Governance 2(4), 357\u2013377 (2009)","DOI":"10.1504\/IJEG.2009.030527"},{"key":"9_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-36213-2_15","volume-title":"Security Protocols XVII","author":"PYA Ryan","year":"2013","unstructured":"Ryan, P.Y.A., Teague, V.: Pretty good democracy. In: Christianson, B., Malcolm, J.A., Maty\u00e1\u0161, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 111\u2013130. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36213-2_15"},{"key":"9_CR28","unstructured":"Sherman, A.T., et al.: An examination of vote verification technologies: findings and experiences from the Maryland study (2006)"},{"key":"9_CR29","unstructured":"Volkamer, M., Kulyk, O., Ludwig, J., Fuhrberg, N.: Increasing security without decreasing usability: comparison of various verifiable voting systems. In: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, August 2022. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/volkamer"},{"key":"9_CR30","unstructured":"Weber, J.L., Hengartner, U.: Usability study of the open audit voting system Helios (2009). https:\/\/www.jannaweber.com\/wp-content\/uploads\/2009\/09\/858Helios.pdf. 12 May 2022"},{"key":"9_CR31","unstructured":"Winckler, M., et al.: Assessing the usability of open verifiable E-voting systems: a trial with the system Pr\u00eat \u00e0 voter. In: ICE-GOV, pp. 281\u2013296 (2009)"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15911-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T23:04:38Z","timestamp":1664233478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15911-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031159107","9783031159114"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15911-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bregenz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}