{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:07:56Z","timestamp":1757628476503,"version":"3.44.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032050359","type":"print"},{"value":"9783032050366","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>We revisit \u201csilent coercion\u201d where an adversary gains access to a voter\u2019s credential without the voter\u2019s knowledge in an E2E verifiable, coercion-resistant Internet voting system. We argue that in this setting, casting an intended vote is impossible since the cryptographic backend can no longer distinguish the voter and adversary. However, we affirm that the voter can still act to nullify adversarial ballots, which is preferable to inaction. We provide a new instantiation of nullification using zero-knowledge proofs and multiparty computation, which improves on the efficiency of the current state-of-the-art. We also demonstrate an example voting system\u2014VoteXX\u2014that uses nullification. Our nullification protocol can complement new and existing techniques for coercion resistance (which all require voters to hide cryptographic keys from the coercer), providing a failsafe option for voters whose keys leak.<\/jats:p>","DOI":"10.1007\/978-3-032-05036-6_3","type":"book-chapter","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:37Z","timestamp":1757488957000},"page":"38-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting Silent Coercion"],"prefix":"10.1007","author":[{"given":"David","family":"Chaum","sequence":"first","affiliation":[]},{"given":"Richard T.","family":"Carback","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Nejadgholi","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Alan T.","family":"Sherman","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Yaksetig","sequence":"additional","affiliation":[]},{"given":"Zeyuan","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Zag\u00f3rski","sequence":"additional","affiliation":[]},{"given":"Bingsheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"3_CR1","unstructured":"Achenbach, D., Kempka, C., L\u00f6we, B., M\u00fcller-Quade, J.: Improved coercion-resistant electronic elections through deniable re-voting. USENIX JETS (2015)"},{"key":"3_CR2","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, pp. 335\u2013348 (2008)"},{"key":"3_CR3","unstructured":"Adida, B., Marneffe, O.d., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of Helios. In: EVT\/WOTE (2009)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bernhard, D., Pereira, O., Warinschi, B.: How not to prove yourself: pitfalls of the Fiat-Shamir heuristic and applications to Helios. In: ASIACRYPT (2012)","DOI":"10.1007\/978-3-642-34961-4_38"},{"key":"3_CR5","unstructured":"Carback, R.T., et al.: Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy. In: USENIX Security Symposium (2010)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"3_CR7","unstructured":"Chaum, D.: Random-Sample Voting (2012). online"},{"key":"3_CR8","unstructured":"Chaum, D., et al.: Votexx: a solution to improper influence in voter-verifiable elections. In: E-Vote-ID (2022)"},{"key":"3_CR9","unstructured":"Chaum, D., et al.: Votexx: extreme coercion resistance. IARC ePrint 2024\/1354 (2024)"},{"key":"3_CR10","unstructured":"Chaum, D., Moser, T.: ecash 2.0 inalienably private and quantum-resistant to counterfeiting. Tech. rep. (2022)"},{"key":"3_CR11","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: CRYPTO (1992)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Clark, J., Hengartner, U.: Selections: internet voting with over-the-shoulder coercion-resistance. In: Financial Cryptography (2011)","DOI":"10.1007\/978-3-642-27576-0_4"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354\u2013368 (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: EUROCRYPT (1997)","DOI":"10.1007\/3-540-69053-0_9"},{"key":"3_CR15","unstructured":"Essex, A., Clark, J., Hengartner, U.: Cobra: Toward concurrent ballot authorization for Internet voting. In: EVT\/WOTE (2012)"},{"key":"3_CR16","unstructured":"Eyal, I.: On cryptocurrency wallet design. In: Tokenomics (2021)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: CRYPTO, pp. 186\u2013194 (1986)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Grewal, G.S., Ryan, M.D., Bursuc, S., Ryan, P.Y.A.: Caveat coercitor: coercion-evidence in electronic voting. In: IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.32"},{"key":"3_CR19","unstructured":"Haenni, R., Spycher, O.: Secure Internet voting on limited devices with anonymized DSA public keys. In: EVT\/WOTE (2011)"},{"key":"3_CR20","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-642-14303-8_9","volume-title":"Efficient Secure Two-Party Protocols","author":"C Hazay","year":"2010","unstructured":"Hazay, C., Lindell, Y.: Search problems. In: Efficient Secure Two-Party Protocols. ISC, pp. 227\u2013254. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14303-8_9"},{"key":"3_CR21","unstructured":"Hirt, M.: Multi-Party Computation: Efficient Protocols, General Adversaries and Voting. Ph.D. thesis, ETH Zurich (2001)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: EUROCRYPT (2000)","DOI":"10.1007\/3-540-45539-6_38"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Mix and match: Secure function evaluation via ciphertexts. In: ASIACRYPT (2000)","DOI":"10.1007\/3-540-44448-3_13"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jacobsson, M.: Coercion-Resistant electronic elections. In: ACM WPES (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Kulyk, O., Teague, V., Volkamer, M.: Extending helios towards private eligibility verifiability. In: E-Voting and Identity (2015)","DOI":"10.1007\/978-3-319-22270-7_4"},{"key":"3_CR26","unstructured":"Lueks, W., Querejeta-Azurmendi, I., Troncoso, C.: Voteagain: A scalable coercion-resistant voting system. In: USENIX Security (2020)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Maurer, U.: Unifying zero-knowledge proofs of knowledge. In: AFRICACRYPT (2009)","DOI":"10.1007\/978-3-642-02384-2_17"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: ACM CCS (2001)","DOI":"10.1145\/501997.502000"},{"key":"3_CR29","unstructured":"Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: CRYPTO (1992)"},{"key":"3_CR30","unstructured":"Park, C., Itoh, K., Kurosawa, K.: Efficient anonymous channel and all\/nothing election scheme. In: EUROCRYPT (1993)"},{"key":"3_CR31","unstructured":"Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: EUROCRYPT (1991)"},{"issue":"3","key":"3_CR32","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991). https:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Cryptol."},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Wen, R., Buckland, R.: Masked ballot voting for receipt-free online elections. In: VOTE-ID (2009)","DOI":"10.1007\/978-3-642-04135-8_2"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Zag\u00f3rski, F., Carback\u00a0III, R.T., Chaum, D., Clark, J., Essex, A., Vora, P.L.: Remotegrity: design and use of an end-to-end verifiable remote voting system. In: ACNS (2013)","DOI":"10.1007\/978-3-642-38980-1_28"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05036-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:22:44Z","timestamp":1757488964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05036-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"ISBN":["9783032050359","9783032050366"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05036-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"11 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nancy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-vote-id-2025.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}