论文标题
投票方案中的自然战略能力
Natural Strategic Abilities in Voting Protocols
论文作者
论文摘要
安全属性通常集中在系统的技术方面。一个隐含地假设用户将以正确的方式行事以保存手头的财产。在现实生活中,这是理所当然的。特别是,用户通常会忽略困难和昂贵的安全机制,并且并没有真正捍卫系统免受可能的攻击。 在这里,我们根据用户战略行为的复杂性提出了一个分级的安全性概念。更确切地说,我们建议可以根据(a)选民需要执行$φ$ TRUE的策略的复杂性来定义安全属性$φ$的水平,以及(b)用户必须在途中使用的资源。获得$φ$的简单简单越便宜,安全性越高。 我们演示了基于电子投票情况的案例研究中该想法的工作方式。为此,我们为抗胁迫和对选民验证的选举的\ Prep投票协议的VVOTE实施进行了建模。然后,我们确定了选民获得收据的“自然”策略,并衡量选民所需的努力。我们还研究了强迫者通过随机攻击妥协选举的难度。
Security properties are often focused on the technological side of the system. One implicitly assumes that the users will behave in the right way to preserve the property at hand. In real life, this cannot be taken for granted. In particular, security mechanisms that are difficult and costly to use are often ignored by the users, and do not really defend the system against possible attacks. Here, we propose a graded notion of security based on the complexity of the user's strategic behavior. More precisely, we suggest that the level to which a security property $φ$ is satisfied can be defined in terms of (a) the complexity of the strategy that the voter needs to execute to make $φ$ true, and (b) the resources that the user must employ on the way. The simpler and cheaper to obtain $φ$, the higher the degree of security. We demonstrate how the idea works in a case study based on an electronic voting scenario. To this end, we model the vVote implementation of the \Pret voting protocol for coercion-resistant and voter-verifiable elections. Then, we identify "natural" strategies for the voter to obtain receipt-freeness, and measure the voter's effort that they require. We also look at how hard it is for the coercer to compromise the election through a randomization attack.