A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability

Yun Xing Kho*, Swee Huay Heng*, Syh Yuan Tan, Ji Jian Chin

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Downloads (Pure)

Abstract

Ensuring both cast-as-intended (CAI) verifiability and coercion-resistance in e-voting remains a critical challenge. The e-voting scheme proposed by Finogina and Herranz in 2023 represents the first notable advancement in reconciling these conflicting requirements. CAI verifiability allows voters to confirm that their intended vote has been correctly recorded, even without a secure channel to the election committee, while coercion-resistance prevents external influence and vote-selling. However, essential security properties such as confidentiality, anonymity, unforgeability, and double-voting prevention fall outside the scope of Finogina and Herranz’s e-voting scheme, leaving significant gaps in its security guarantees. To address this limitation, we propose a novel e-voting scheme that simultaneously achieves CAI verifiability, coercion-resistance, confidentiality, anonymity, unforgeability, and double-voting prevention while maintaining an asymptotic complexity of O(n). To the best of our knowledge, no existing scheme satisfies all these properties concurrently. Moreover, we establish that anonymity inherently implies CAI verifiability in e-voting schemes, a result of independent interest. By strengthening security and privacy guarantees, our work bridges existing gaps and provides a comprehensive security model that serves as a foundation for the design of future e-voting systems.

Original languageEnglish
Article numbere0324182
JournalPLoS ONE
Volume20
Issue number6 JUNE
DOIs
Publication statusPublished - Jun 2025

ASJC Scopus subject areas

  • Multidisciplinary

Fingerprint

Dive into the research topics of 'A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability'. Together they form a unique fingerprint.

Cite this