{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:08:14Z","timestamp":1765357694015,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031722431"},{"type":"electronic","value":"9783031722448"}],"license":[{"start":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:00:00Z","timestamp":1727049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:00:00Z","timestamp":1727049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Coercion and vote-buying are challenging and multi-faceted threats that prevent people from expressing their will freely. Even though there are known techniques to resist or partially mitigate coercion and vote-buying, we explicitly demonstrate that they generally underestimate the power of malicious actors by not accounting for current technological tools that could support coercion and vote-selling. In this paper, we give several examples of how a coercer can force voters to comply with his demands or how voters can prove how they voted. To do so, we use tools like blockchains, delay encryption, privacy-preserving smart contracts, or trusted hardware. Since some of the successful coercion attacks occur on voting schemes that were supposed\/claimed\/proven to be coercion-resistant or receipt-free, the main conclusion of this work is that the coercion models should be re-evaluated, and new definitions of coercion and receipt-freeness are necessary. We propose such new definitions as part of this paper and investigate their implications.<\/jats:p>","DOI":"10.1007\/978-3-031-72244-8_9","type":"book-chapter","created":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T19:01:32Z","timestamp":1727031692000},"page":"141-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Expanding the\u00a0Toolbox: Coercion and\u00a0Vote-Selling at\u00a0Vote-Casting Revisited"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2785-8301","authenticated-orcid":false,"given":"Peter B.","family":"R\u00f8nne","sequence":"first","affiliation":[]},{"given":"Tamara","family":"Finogina","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Herranz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,23]]},"reference":[{"key":"9_CR1","unstructured":"On-chain vote buying and the rise of dark DAOs. https:\/\/hackingdistributed.com\/2018\/07\/02\/on-chain-vote-buying\/. Accessed 13 Dec 2023"},{"key":"9_CR2","unstructured":"Adida, B.: Helios: Web-based Open-Audit Voting. In: USENIX Security\u20190817th USENIX Security Symposium, pp. 335\u2013348 (2008)"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-031-47754-6_16","volume-title":"Financial Cryptography and Data Security: 27th International Conference, FC 2023, Bol, Bra\u010d, Croatia, May 1\u20135, 2023, Revised Selected Papers, Part I","author":"C Baum","year":"2024","unstructured":"Baum, C., Chiang, J.H., David, B., Frederiksen, T.K.: Eagle: efficient privacy preserving smart contracts. In: Baldimtsi, F., Cachin, C. (eds.) Financial Cryptography and Data Security: 27th International Conference, FC 2023, Bol, Bra\u010d, Croatia, May 1\u20135, 2023, Revised Selected Papers, Part I, pp. 270\u2013288. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-47754-6_16"},{"key":"9_CR4","unstructured":"Benaloh, J.: Simple verifiable elections. In: EVT\u201906 Electronic Voting Technology Workshop (2006)"},{"key":"9_CR5","unstructured":"Benaloh, J., et al.: Star-vote: a secure, transparent, auditable, and reliable voting system. arXiv preprint arXiv:1211.1904 (2012)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bougon, M., et al.: Themis: an on-site voting system with systematic cast-as-intended verification and partial accountability. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 397\u2013410 (2022)","DOI":"10.1145\/3548606.3560563"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-030-54455-3_25","volume-title":"Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers","author":"C Boyd","year":"2020","unstructured":"Boyd, C., Haines, T., R\u00f8nne, P.B.: Vote selling resistant voting. In: Bernhard, M., Bracciali, A., Camp, L.J., Matsuo, S., Maurushat, A., R\u00f8nne, P.B., Sala, M. (eds.) Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers, pp. 345\u2013359. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_25"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-030-77870-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I","author":"J Burdges","year":"2021","unstructured":"Burdges, J., De Feo, L.: Delay encryption. In: Canteaut, A., Standaert, F.-X. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I, pp. 302\u2013326. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_11"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Chaidos, P., Cortier, V., Fuchsbauer, G., Galindo, D.: BeleniosRF: A non-interactive receipt-free electronic voting scheme. In: Proceedings of CCS\u20192016, pp. 1614\u20131625 (2016)","DOI":"10.1145\/2976749.2978337"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-32747-6_9","volume-title":"E-Voting and Identity","author":"D Chaum","year":"2012","unstructured":"Chaum, D., et al.: Paperless independently-verifiable voting. In: Kiayias, A., Lipmaa, H. (eds.) E-Voting and Identity, pp. 140\u2013157. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32747-6_9"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy (S &P 2008), 18\u201321 May 2008, Oakland, California, USA, pp. 354\u2013368. IEEE Computer Society (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-48806-1_1","volume-title":"Financial Cryptography and Data Security. FC 2023 International Workshops: Voting, CoDecFin, DeFi, WTSC, Bol, Bra\u010d, Croatia, May 5, 2023, Revised Selected Papers","author":"V Cortier","year":"2024","unstructured":"Cortier, V., Debant, A., Gaudry, P., Glondu, S.: Belenios with\u00a0cast as\u00a0intended. In: Essex, A., et al. (eds.) Financial Cryptography and Data Security. FC 2023 International Workshops: Voting, CoDecFin, DeFi, WTSC, Bol, Bra\u010d, Croatia, May 5, 2023, Revised Selected Papers, pp. 3\u201318. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-48806-1_1"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Cortier, V., Gaudry, P., Glondu, S.: Belenios: a simple private and verifiable electronic voting system. Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows, pp. 214\u2013238 (2019)","DOI":"10.1007\/978-3-030-19052-1_14"},{"key":"9_CR14","unstructured":"Cortier, V., Gaudry, P., Yang, Q.: Is the JCJ voting system really coercion-resistant? Cryptology ePrint Archive (2022)"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-031-47754-6_15","volume-title":"Financial Cryptography and Data Security: 27th International Conference, FC 2023, Bol, Bra\u010d, Croatia, May 1\u20135, 2023, Revised Selected Papers, Part I","author":"N D\u00f6ttling","year":"2024","unstructured":"D\u00f6ttling, N., Hanzlik, L., Magri, B., Wohnig, S.: McFly: verifiable encryption to\u00a0the\u00a0future made practical. In: Baldimtsi, F., Cachin, C. (eds.) Financial Cryptography and Data Security: 27th International Conference, FC 2023, Bol, Bra\u010d, Croatia, May 1\u20135, 2023, Revised Selected Papers, Part I, pp. 252\u2013269. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-47754-6_15"},{"key":"9_CR16","volume":"76","author":"T Finogina","year":"2023","unstructured":"Finogina, T., Herranz, J.: On remote electronic voting with both coercion resistance and cast-as-intended verifiability. J. Inform. Security Appl. 76, 103554 (2023)","journal-title":"J. Inform. Security Appl."},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-030-92548-2_25","volume-title":"Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings","author":"T Finogina","year":"2021","unstructured":"Finogina, T., Herranz, J., Larraia, E.: How (not) to\u00a0achieve both\u00a0coercion resistance and\u00a0cast as intended verifiability in\u00a0remote evoting. In: Conti, M., Stevens, M., Krenn, S. (eds.) Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings, pp. 483\u2013491. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92548-2_25"},{"key":"9_CR18","unstructured":"Finogina, T., Herranz, J., Roenne, P.B.: Expanding the toolbox: coercion and vote-selling at vote-casting revisited. Cryptology ePrint Archive, Paper 2024\/1167 (2024)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-31919-9_11","volume-title":"Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1\u20134, 2019, Proceedings","author":"A Fraser","year":"2019","unstructured":"Fraser, A., Quaglia, E.A., Smyth, B.: A critique of game-based definitions of receipt-freeness for voting. In: Steinfeld, R., Yuen, T.H. (eds.) Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1\u20134, 2019, Proceedings, pp. 189\u2013205. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31919-9_11"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 61\u201370 (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-12980-3_23","volume-title":"Towards Trustworthy Elections","author":"J Kelsey","year":"2010","unstructured":"Kelsey, J., Regenscheid, A., Moran, T., Chaum, D.: Attacking paper-based e2e voting systems. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections, pp. 370\u2013387. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12980-3_23"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-3-030-26948-7_22","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part I","author":"G Malavolta","year":"2019","unstructured":"Malavolta, G., Thyagarajan, S.A.K.: Homomorphic time-lock puzzles and applications. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part I, pp. 620\u2013649. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_22"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-70972-7_20","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2017","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 357\u2013375. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_20"},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-031-43756-4_8","volume-title":"Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3\u20136, 2023, Proceedings","author":"J M\u00fcller","year":"2023","unstructured":"M\u00fcller, J., Truderung, T.: CAISED: a protocol for\u00a0cast-as-intended verifiability with\u00a0a\u00a0second device. In: Volkamer, M., et al. (eds.) Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3\u20136, 2023, Proceedings, pp. 123\u2013139. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-43756-4_8"},{"key":"9_CR25","unstructured":"Nasser, Y., Okoye, C., Clark, J., Ryan, P.Y.: Blockchains and voting: Somewhere between hype and a panacea. White Paper (2018)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Park, S., Specter, M., Narula, N., Rivest, R.L.: Going from bad to worse: from internet voting to blockchain voting. J. Cybersecurity 7(1) (2021)","DOI":"10.1093\/cybsec\/tyaa025"},{"key":"9_CR27","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of CRYPTO (1991)"},{"key":"9_CR28","unstructured":"Pereira, O., Adida, B., de\u00a0Marneffe, O.: Bringing open audit elections into practice: Real world uses of Helios. In: swiss e-voting workshop (2010)"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-12980-3_15","volume-title":"Towards Trustworthy Elections","author":"S Popoveniuc","year":"2010","unstructured":"Popoveniuc, S., Hosp, B.: An introduction to punchscan. In: Chaum, D., et al. (eds.) Towards Trustworthy Elections, pp. 242\u2013259. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12980-3_15"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Qi, H., Xu, M., Yu, D., Cheng, X.: Sok: privacy-preserving smart contract. High-Confidence Computing, p. 100183 (2023)","DOI":"10.1016\/j.hcc.2023.100183"},{"key":"9_CR31","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto (1996)"},{"key":"9_CR32","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-662-63958-0_22","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers","author":"PB R\u00f8nne","year":"2021","unstructured":"R\u00f8nne, P.B., Ryan, P.Y.A., Smyth, B.: Cast-as-intended: a formal definition and case studies. In: Bernhard, M., et al. (eds.) Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers, pp. 251\u2013262. Springer Berlin Heidelberg, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_22"},{"key":"9_CR33","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-642-23496-5_14","volume-title":"Autonomic and Trusted Computing","author":"M Smart","year":"2011","unstructured":"Smart, M., Ritter, E.: True trustworthy elections: remote electronic voting using trusted computing. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) Autonomic and Trusted Computing, pp. 187\u2013202. Springer Berlin Heidelberg, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23496-5_14"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72244-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T19:02:04Z","timestamp":1727031724000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72244-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,23]]},"ISBN":["9783031722431","9783031722448"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72244-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,9,23]]},"assertion":[{"value":"23 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tarragona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}