Credenciais de Votação baseadas em BIP para Protocolos de Votação Resistentes à Coerção

  • Matheus de Sá UFPA
  • Roberto Araújo UFPA

Abstract


Coercion-resistant voting protocols rely on credentials to fight coercive attacks. For this, each voter receives a credential that she uses for voting and must generate a new random one when she is under coercion. However, credentials are usually large numbers that are difficult to hold. This makes hard the use of these protocols in practical voting scenarios. Aiming at overcoming this shortcoming, this work investigate the use of BIP-39 as a base to more practical credentials.

References

Araújo, R., Rajeb, N. B., Robbana, R., Traoré, J., and Yousfi, S. (2010). Towards practical and secure coercion-resistant electronic elections. In Heng, S., Wright, R. N., and Goi,

B., editors, Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, volume 6467 of Lecture Notes in Computer Science, pages 278–297. Springer.

Bitcoin (2019). Readme.mediawiki. https://github.com/bitcoin/bips. GitHub repository.

Buterin, V. (2013). Deterministic wallets, their advantages and their understated flaws. Bitcoin Magazine.

Clark, J. and Hengartner, U. (2008). Panic passwords: Authenticating under duress. Hot- Sec, 8:8.

Clark, J. and Hengartner, U. (2011). Selections: Internet voting with over-the-shoulder coercion-resistance. In International Conference on Financial Cryptography and Data Security, pages 47–61. Springer.

Juels, A., Catalano, D., and Jakobsson, M. (2010). Coercion-resistant electronic elections. In Towards Trustworthy Elections, pages 37–63. Springer.

Kaliski, B. (2000). Rfc 2898; pkcs# 5: Password-based cryptography specification version 2.0.

Neto, A. S., Leite, M., Araújo, R., Mota, M. P., Neto, N. C. S., and Traoré, J. (2018). Usability considerations for coercion-resistant election systems. In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, page 40. ACM.

Neumann, S. and Volkamer, M. (2012). Civitas and the real world: problems and solutions from a practical point of view. In 2012 Seventh International Conference on Availability, Reliability and Security, pages 180–185. IEEE.

Palatinus, M., Rusnak, P., Voisine, A., and Bowe, S. (2013). Mnemonic code for generating deterministic keys. https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki. GitHub repository.
Published
2019-09-02
DE SÁ, Matheus; ARAÚJO, Roberto. Credenciais de Votação baseadas em BIP para Protocolos de Votação Resistentes à Coerção. In: WORKSHOP ON ELECTORAL TECHNOLOGY, 4. , 2019, São Paulo. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . p. 49-57. DOI: https://doi.org/10.5753/wte.2019.14043.