E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting (2404.12075v1)
Abstract: Online voting is attractive for convenience and accessibility, but is more susceptible to voter coercion and vote buying than in-person voting. One mitigation is to give voters fake voting credentials that they can yield to a coercer. Fake credentials appear identical to real ones, but cast votes that are silently omitted from the final tally. An important unanswered question is how ordinary voters perceive such a mitigation: whether they could understand and use fake credentials, and whether the coercion risks justify the costs of mitigation. We present the first systematic study of these questions, involving 150 diverse individuals in Boston, Massachusetts. All participants "registered" and "voted" in a mock election: 120 were exposed to coercion resistance via fake credentials, the rest forming a control group. Of the 120 participants exposed to fake credentials, 96% understood their use. 53% reported that they would create fake credentials in a real-world voting scenario, given the opportunity. 10% mistakenly voted with a fake credential, however. 22% reported either personal experience with or direct knowledge of coercion or vote-buying incidents. These latter participants rated the coercion-resistant system essentially as trustworthy as in-person voting via hand-marked paper ballots. Of the 150 total participants to use the system, 87% successfully created their credentials without assistance; 83% both successfully created and properly used their credentials. Participants give a System Usability Scale score of 70.4, which is slightly above the industry's average score of 68. Our findings appear to support the importance of the coercion problem in general, and the promise of fake credentials as a possible mitigation, but user error rates remain an important usability challenge for future work.
- P. Ehin, M. Solvak, J. Willemson, and P. Vinkel, “Internet voting in Estonia 2005–2019: Evidence from eleven elections,” Government Information Quarterly, vol. 39, no. 4, p. 101718, Oct. 2022.
- P. van den Besselaar, A.-M. Oostveen, F. De Cindio, and D. Ferrazzi, “Experiments with E-Voting Technology: Experiences and Lessons,” Social Science Research Network, Scholarly Paper 1433569, 2003.
- D. Jefferson, A. D. Rubin, B. Simons, and D. Wagner, “A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE),” 2004.
- R. Krimmer, D. Duenas-Cid, and I. Krivonosova, “Debate: Safeguarding democracy during pandemics. Social distancing, postal, or internet voting—the good, the bad or the ugly?” Public Money & Management, vol. 41, no. 1, pp. 8–10, Jan. 2021.
- J. Benaloh, “Verifiable Secret-Ballot Elections,” Ph.D. dissertation, 1987.
- B. Adida, “Helios: Web-based Open-Audit Voting.” in USENIX Security Symposium, vol. 17, 2008, pp. 335–348.
- V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, “SoK: Verifiability Notions for E-Voting Protocols,” in 2016 IEEE Symposium on Security and Privacy, 2016.
- R. Küsters, J. Liedtke, J. Müller, D. Rausch, and A. Vogt, “Ordinos: A Verifiable Tally-Hiding E-Voting System,” in 2020 IEEE European Symposium on Security and Privacy, 2020.
- Y.-X. Kho, S.-H. Heng, and J.-J. Chin, “A Review of Cryptographic Electronic Voting,” Symmetry, vol. 14, no. 5, p. 858, May 2022.
- J. Benaloh, “Ballot Casting Assurance via Voter-Initiated Poll Station Auditing,” in 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, Boston, MA, Aug. 2007.
- V. Cortier, A. Debant, P. Gaudry, and S. Glondu, “Belenios with cast as intended,” in Voting 2023 - 8th Workshop on Advances in Secure Electronic Voting, May 2023.
- A. Juels, D. Catalano, and M. Jakobsson, “Coercion-Resistant Electronic Elections,” in Towards Trustworthy Elections: New Directions in Electronic Voting, Berlin, Heidelberg, 2010, pp. 37–63.
- J. Benaloh and D. Tuinstra, “Receipt-free secret-ballot elections,” ser. STOC ’94, May 1994.
- S. Park, M. Specter, N. Narula, and R. L. Rivest, “Going from bad to worse: From Internet voting to blockchain voting,” Journal of Cybersecurity, vol. 7, no. 1, Feb. 2021.
- P. Daian, T. Kell, I. Miers, and A. Juels, “On-Chain Vote Buying and the Rise of Dark DAOs,” Jul. 2018.
- R. Küsters, T. Truderung, and A. Vogt, “A Game-Based Definition of Coercion-Resistance and Its Applications,” in 23rd IEEE Computer Security Foundations Symposium, 2010, pp. 122–136.
- “Protocol of the Swiss Post Voting System: Computational Proof of Complete Verifiability and Privacy,” Tech. Rep. 1.0.0, 2021.
- S. Bell, J. Benaloh, M. D. Byrne, D. Debeauvoir, B. Eakin, P. Kortum, N. McBurnett, O. Pereira, P. B. Stark, D. S. Wallach, G. Fisher, J. Montoya, M. Parker, and M. Winn, “STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System,” in 2013 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections.
- D. Achenbach, C. Kempka, B. Löwe, and J. Müller-Quade, “Improved Coercion-Resistant Electronic Elections through Deniable Re-Voting,” in USENIX Journal of Election Technology and Systems, 2015.
- K. Krips and J. Willemson, “On Practical Aspects of Coercion-Resistant Remote Voting Systems,” in E-Vote-ID 2019: Electronic Voting, 2019, pp. 216–232.
- W. Lueks, I. Querejeta-Azurmendi, and C. Troncoso, “VoteAgain: A scalable coercion-resistant voting system,” in 29th USENIX Security Symposium, 2020, pp. 1553–1570.
- O. Kulyk and S. Neumann, “Human Factors in Coercion Resistant Internet Voting–A Review of Existing Solutions and Open Challenges,” in Proceedings of the Fifth International Joint Conference on Electronic Voting. TalTech press, 2020, p. 189.
- D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti, M. MacAlpine, and J. A. Halderman, “Security Analysis of the Estonian Internet Voting System,” in ACM SIGSAC Conference on Computer and Communications Security, 2014.
- S. Neumann and M. Volkamer, “Civitas and the Real World: Problems and Solutions from a Practical Point of View,” in Seventh Conference on Availability, Reliability and Security, 2012.
- E. Estaji, T. Haines, K. Gjøsteen, P. B. Rønne, P. Y. A. Ryan, and N. Soroush, “Revisiting Practical and Usable Coercion-Resistant Remote E-Voting,” in E-Vote-ID 2020: Electronic Voting, 2020.
- A. S. Neto, M. Leite, R. Araújo, M. P. Mota, N. C. S. Neto, and J. Traoré, “Usability Considerations For Coercion-Resistant Election Systems,” in Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, ser. IHC 2018, Oct. 2018, pp. 1–10.
- L.-H. Merino, S. Colombo, R. Reyes, A. Azhir, H. Zhang, J. Allen, B. Tellenbach, V. Estrada-Galiñanes, and B. Ford, “TRIP: Trust-Limited Coercion-Resistant In-Person Voter Registration.” [Online]. Available: https://arxiv.org/abs/2202.06692
- D. Chaum, R. T. Carback, J. Clark, C. Liu, M. Nejadgholi, B. Preneel, A. T. Sherman, M. Yaksetig, and F. Zagorski, “VoteXX: A Remote Voting System that is Coercion Resistant,” Oct. 2020.
- M. Backes, M. Gagné, and M. Skoruppa, “Using mobile device communication to strengthen e-Voting protocols,” in Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, 2013.
- T. Krivoruchko, “Robust Coercion-Resistant Registration for Remote E-voting,” in Proceedings of the IAVoSS Workshop on Trustworthy Elections, 2007.
- O. Spycher, R. Koenig, R. Haenni, and M. Schläpfer, “A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time,” in Proceedings of the 15th International Conference on Financial Cryptography and Data Security, 2011, pp. 182–189.
- R. Araújo, S. Foulle, and J. Traoré, “A Practical and Secure Coercion-Resistant Scheme for Internet Voting,” in Towards Trustworthy Elections: New Directions in Electronic Voting, 2010.
- J. Benaloh, T. Moran, L. Naish, K. Ramchen, and V. Teague, “Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting,” IEEE Transactions on Information Forensics and Security, 2009.
- S. G. Weber, R. Araujo, and J. Buchmann, “On Coercion-Resistant Electronic Elections with Linear Work,” in The Second Conference on Availability, Reliability and Security, 2007.
- M. Bernhard, A. McDonald, H. Meng, J. Hwa, N. Bajaj, K. Chang, and J. A. Halderman, “Can Voters Detect Malicious Manipulation of Ballot Marking Devices?” in 2020 IEEE Symposium on Security and Privacy, May 2020, pp. 679–694.
- J. Brooke, “SUS: A ‘Quick and Dirty’ Usability Scale,” in Usability Evaluation In Industry. CRC Press, 1996.
- B. Laugwitz, T. Held, and M. Schrepp, “Construction and evaluation of a user experience questionnaire,” in Symposium of the Austrian HCI and Usability Engineering Group. Springer, 2008, pp. 63–76.
- A. Hinderks, M. Schrepp, F. J. Domínguez Mayo, M. J. Escalona, and J. Thomaschewski, “Developing a UX KPI based on the user experience questionnaire,” Computer Standards & Interfaces, 2019.
- J. Kjeldskov and M. B. Skov, “Studying Usability In Sitro: Simulating Real World Phenomena in Controlled Environments,” International Journal of Human–Computer Interaction, 2007.
- R. Ploetzner, S. Berney, and M. Bétrancourt, “When learning from animations is more successful than learning from static pictures: Learning the specifics of change,” Instructional Science, 2021.
- S. Türkay, “The effects of whiteboard animations on retention and subjective experiences when learning advanced physics topics,” Computers & Education, vol. 98, pp. 102–114, Jul. 2016.
- R. E. Mayer, L. Fiorella, and A. Stull, “Five ways to increase the effectiveness of instructional video,” Educational Technology Research and Development, vol. 68, no. 3, pp. 837–852, Jun. 2020.
- R. Likert, “A technique for the measurement of attitudes.” Archives of Psychology, vol. 22 140, pp. 55–55, 1932.
- “Four people plead guilty in North Carolina ballot probe of 2016 and 2018 elections,” NBC News, 2022.
- “Verifier - Verified Voting 2024,” https://verifiedvoting.org/verifier/.
- S. Atske, “Pew Research Center - The voting experience in 2020,” Nov. 2020.
- C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach, “Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II,” vol. 2, no. 3, 2014.
- P. Y. A. Ryan, D. Bismark, J. Heather, S. Schneider, and Z. Xia, “PrÊt À Voter: A Voter-Verifiable Voting System,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 662–673, 2009.
- D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, R. L. Rivest, P. Y. A. Ryan, E. Shen, and A. T. Sherman, “Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 611–627, Dec. 2009.
- C. Z. Acemyan, P. Kortum, M. D. Byrne, and D. S. Wallach, “Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use,” Human Factors, pp. 866–889, Aug. 2022.
- NIST, “Voluntary Voting System Guidelines Version 2.0,” Tech. Rep., Feb. 2021.
- ——, “Usability Performance Benchmarks For the Voluntary Voting System Guidelines,” Tech. Rep., Aug. 2007.
- A. Bangor, P. Kortum, and J. Miller, “Determining what individual SUS scores mean: Adding an adjective rating scale,” Journal of Usability Studies, vol. 4, no. 3, pp. 114–123, 2009.
- M. Schrepp, “User Experience Questionnaire Handbook Version 10.”
- K. Marky, M. Schmitz, F. Lange, and M. Mühlhäuser, “Usability of Code Voting Modalities,” in Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019.
- P. Y. A. Ryan and V. Teague, “Pretty Good Democracy,” in Security Protocols XVII, 2013.
- A. S. Brown, E. Bracken, S. Zoccoli, and K. Douglas, “Generating and remembering passwords,” Applied Cognitive Psychology, vol. 18, no. 6, pp. 641–651, 2004.
- R. Dhamija and A. Perrig, “Deja Vu: A User Study Using Images for Authentication,” in 9th USENIX Security Symposium (USENIX Security 00), 2000.
- D. Khader, Q. Tang, and P. Y. Ryan, “Proving prêt à voter receipt free using computational security models,” in 2013 Electronic Voting Technology Workshop, 2013.
- S. Neumann, C. Feier, M. Volkamer, and R. Koenig, “Towards a practical JCJ/Civitas implementation,” in Informatik Angepasst an Mensch, Organisation Und Umwelt, 2013.
- M. R. Clarkson, S. Chong, and A. C. Myers, “Civitas: Toward a Secure Voting System,” in 2008 IEEE Symposium on Security and Privacy, May 2008, pp. 354–368.
- V. Distler, M.-L. Zollinger, C. Lallemand, P. B. Roenne, P. Y. A. Ryan, and V. Koenig, “Security - Visible, Yet Unseen?” 2019.
- P. B. Stark, “There is no Reliable Way to Detect Hacked Ballot-Marking Devices,” Election Law Journal Rules, Politics and Policy, vol. 19, no. 3, 2019.
- A. W. Appel, R. A. DeMillo, and P. B. Stark, “Ballot-Marking Devices Cannot Ensure the Will of the Voters,” Election Law Journal: Rules, Politics, and Policy, vol. 19, no. 3, pp. 432–450, Sep. 2020.