{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:08:17Z","timestamp":1765357697542,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031722431"},{"type":"electronic","value":"9783031722448"}],"license":[{"start":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:00:00Z","timestamp":1727049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:00:00Z","timestamp":1727049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Coercion resistance is a strong security property of electronic voting that prevents adversaries from forcing voters to vote in a specific way by using threats or rewards. There exist clever techniques aimed at preventing voter coercion based on fake credentials, but they are either inefficient or cannot support features such as revoting without leaking more information than necessary to coercers. One of the reasons is that invalid ballots cast due to revoting or coercion need to be removed before the tallying. In this paper, we propose a coercion-resistant Internet voting scheme that does not require the removal of invalid ballots, hence avoids the leakage of information, but still supports revoting. The scheme is very efficient and achieves linear tallying.<\/jats:p>","DOI":"10.1007\/978-3-031-72244-8_5","type":"book-chapter","created":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T19:01:32Z","timestamp":1727031692000},"page":"72-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Cleansing in\u00a0Coercion-Resistant Voting"],"prefix":"10.1007","author":[{"given":"Rosario","family":"Giustolisi","sequence":"first","affiliation":[]},{"given":"Maryam Sheikhi","family":"Garjan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,23]]},"reference":[{"key":"5_CR1","unstructured":"Achenbach, D., Kempka, C., L\u00f6we, B., M\u00fcller-Quade, J.: Improved coercion-resistant electronic elections through deniable re-voting. $$\\{$$USENIX$$\\}$$ J. Election Technol. Syst. ($$\\{$$JETS$$\\}$$) 3, 26\u201345 (2015)"},{"key":"5_CR2","unstructured":"Aranha, D.F., Battagliola, M., Roy, L.: Faster coercion-resistant e-voting by encrypted sorting. Cryptol. ePrint Arch. (2023)"},{"key":"5_CR3","unstructured":"Ara\u00fajo, R., Foulle, S., Traor\u00e9, J.: A practical and secure coercion-resistant scheme for remote elections. In: Dagstuhl Seminar Proceedings (2008)"},{"key":"5_CR4","unstructured":"Bernhard, D., Kulyk, O., Volkamer, M.: Security proofs for participation privacy and stronger verifiability for helios. Tech. rep, TU Darmstadt (2016)"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Bernhard, D., Pereira, O., Warinschi, B.: How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios. In: ASIACRYPT 2012, pp. 626\u2013643. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_38","DOI":"10.1007\/978-3-642-34961-4_38"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-27576-0_4","volume-title":"Financial Cryptography and Data Security","author":"J Clark","year":"2012","unstructured":"Clark, J., Hengartner, U.: Selections: internet voting with over-the-shoulder coercion-resistance. In: Danezis, G. (ed.) Financial Cryptography and Data Security, pp. 47\u201361. Springer, Berlin Heidelberg, Berlin, Heidelberg (2012)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy (2008), pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"5_CR8","unstructured":"Cortier, V., Gaudry, P., Yang, Q.: Is the JCJ voting system really coercion-resistant? Cryptol. ePrint Arch. (2022)"},{"key":"5_CR9","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: CRYPTO \u201994 (1994)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Eur. Trans. Telecommun. 8(5), 481\u2013490 (1997)","DOI":"10.1002\/ett.4460080506"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. Inf. Theor. IEEE Trans. 31(4), 469\u2013472 (1985)","DOI":"10.1109\/TIT.1985.1057074"},{"key":"5_CR12","unstructured":"EU Commission: Compendium of e-voting and other ICT practices. https:\/\/commission.europa.eu\/publications\/compendium-e-voting-and-other-ict-practices_en. 06 Dec 2023"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Giustolisi, R., Garjan, M.S., Schuermann, C.: Thwarting last-minute voter coercion. In: 2024 IEEE Symposium on Security and Privacy (SP) (2024)","DOI":"10.1109\/SP54263.2024.00112"},{"key":"5_CR14","unstructured":"Giustolisi, R., Sheikhi, M.: Scheme prototype (2024). https:\/\/github.com\/fgiustol\/Evoteid24"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Grewal, G.S., Ryan, M.D., Bursuc, S., Ryan, P.Y.: Caveat coercitor: coercion-evidence in electronic voting. In: IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.32"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Haghighat, A.T., Dousti, M.S., Jalili, R.: An efficient and provably-secure coercion-resistant e-voting protocol. In: Privacy, Security and Trust (2013)","DOI":"10.1109\/PST.2013.6596050"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Haines, T., Mueller, J., Querejeta-Azurmendi, I.: Scalable coercion-resistant e-voting under weaker trust assumptions. In: ACM SAC\u201923 (2023)","DOI":"10.1145\/3555776.3578730"},{"key":"5_CR18","unstructured":"Haines, T., Smyth, B.: Surveying definitions of coercion resistance. IACR Cryptol. ePrint Arch. 822 (2019)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: ACM Workshop on Privacy in the Electronic Society (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Kulyk, O., Teague, V., Volkamer, M.: Extending helios towards private eligibility verifiability. In: E-Voting and Identity - VoteID 2015 (2015)","DOI":"10.1007\/978-3-319-22270-7_4"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Kusters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: IEEE Computer Security Foundations (2010)","DOI":"10.1109\/CSF.2010.16"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Locher, P., Haenni, R., Koenig, R.E.: Coercion-resistant internet voting with everlasting privacy. In: Financial Cryptography and Data Security: FC 2016 International Workshops, pp. 161\u2013175. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_11","DOI":"10.1007\/978-3-662-53357-4_11"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Lueks, W., Kulynych, B., Fasquelle, J., Le\u00a0Bail-Collet, S., Troncoso, C.: Zksk: a library for composable zero-knowledge proofs. In: WPES (2019)","DOI":"10.1145\/3338498.3358653"},{"key":"5_CR24","unstructured":"Lueks, W., Querejeta-Azurmendi, I., Troncoso, C.: VoteAgain: a scalable coercion-resistant voting system. In: USENIX Security (2020)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"M\u00fcller, J., Pej\u00f3, B., Pryvalov, I.: Devos: deniable yet verifiable vote updating. Proc. Priv. Enhancing Technol. (2024)","DOI":"10.56553\/popets-2024-0021"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"R\u00f8nne, P.B., Atashpendar, A., Gj\u00f8steen, K., Ryan, P.Y.A.: Coercion-resistant voting in linear time via fully homomorphic encryption: towards a quantum-safe scheme. CoRR abs\/1901.02560 (2019)","DOI":"10.1007\/978-3-030-43725-1_20"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Schoenmakers, B., Tuyls, P.: Practical two-party computation based on the conditional gate. In: International Conference on the Theory And Application of Cryptology and Information Security, pp. 119\u2013136. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-30539-2_10","DOI":"10.1007\/978-3-540-30539-2_10"},{"key":"5_CR28","unstructured":"Smyth, B.: Athena: a verifiable, coercion-resistant voting system with linear complexity. Cryptology ePrint Arch.(2019)"},{"key":"5_CR29","unstructured":"Spycher, O., Koenig, R., Haenni, R., Schl\u00e4pfer, M.: Achieving meaningful efficiency in coercion-resistant, verifiable internet voting. Gesellschaft f\u00fcr Informatik eV (2012)"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"Spycher, O., Koenig, R., Haenni, R., Schl\u00e4pfer, M.: A new approach towards coercion-resistant remote e-voting in linear time. In: Financial Cryptography and Data Security, pp. 182\u2013189. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-27576-0_15","DOI":"10.1007\/978-3-642-27576-0_15"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Weber, S.G., Araujo, R., Buchmann, J.: On coercion-resistant electronic elections with linear work. In: ARES, pp. 908\u2013916. IEEE (2007)","DOI":"10.1109\/ARES.2007.108"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72244-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T19:01:46Z","timestamp":1727031706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72244-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,23]]},"ISBN":["9783031722431","9783031722448"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72244-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,9,23]]},"assertion":[{"value":"23 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tarragona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}