%0 Conference Proceedings %T Preventing Board Flooding Attacks in Coercion-Resistant Electronic Voting Schemes %+ Bern University of Applied Sciences (BFH) %+ Université de Fribourg = University of Fribourg (UNIFR) %A Koenig, Reto %A Haenni, Rolf %A Fischli, Stephan %Z Part 4: Network Security and Security Protocols %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 26th International Information Security Conference (SEC) %C Lucerne, Switzerland %Y Jan Camenisch %Y Simone Fischer-Hübner %Y Yuko Murayama %Y Armand Portmann %Y Carlos Rieder %I Springer %3 Future Challenges in Security and Privacy for Academia and Industry %V AICT-354 %P 116-127 %8 2011-06-07 %D 2011 %R 10.1007/978-3-642-21424-0_10 %Z Computer Science [cs]Conference papers %X This paper addresses the board flooding problem of Juels et al.’s coercion-resistant electronic voting scheme. A key property of this scheme is the possibility of casting invalid votes to the public board, which are indistinguishable from proper votes. Exactly this possibility is crucial for making the scheme coercion-resistant, but it also opens doors for flooding the board with an enormous amount of invalid votes, therefore spoiling the efficiency of the tallying process. To prevent such attacks, we present an adaption of the scheme in which each voter receives—in addition to the proper credential—some dummy credentials from the election registrars. Dummy credentials may be used to deceive possible coercers. The list of all dummy credentials is published along with the electoral register. Based on the electoral register and the list of dummy credentials, the system is now capable of making a distinction between invalid votes generated from dummy credentials and invalid votes generated from fake credentials. While the former are kept until the tallying phase, the latter are immediately rejected by the public board. If the public board additionally rejects all incoming duplicate votes, then its maximum size is bounded by the total number of issued credentials. This guarantees an efficient linear-time tallying phase even in case of a massive board flooding attack with a very large number of invalid votes. Although the solution presented in this paper does not yet entirely rule out vote selling or coercion, it makes it at least unbearable for the vast majority of voters. %G English %Z TC 11 %2 https://inria.hal.science/hal-01567595/document %2 https://inria.hal.science/hal-01567595/file/978-3-642-21424-0_10_Chapter.pdf %L hal-01567595 %U https://inria.hal.science/hal-01567595 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-354