A. Neto, Matheus Leite, Roberto Araújo, M. Mota, N. Neto, Jacques Traoré
{"title":"抗胁迫选举系统的可用性考虑","authors":"A. Neto, Matheus Leite, Roberto Araújo, M. Mota, N. Neto, Jacques Traoré","doi":"10.1145/3274192.3274232","DOIUrl":null,"url":null,"abstract":"Coercion is an inherent problem of any Internet election. Because voters can vote from any connected place and there is no voting booth to protect them while voting, coercers can easily force them to select their candidates. Although there is no optimal solution for this problem, modern Internet election systems can mitigate it. In other words, these system usually allow voters under coercion to deceive adversaries by casting fake votes. When in safe, voters can vote again; this time, for their legitimate candidates. This idea helps voters to fight coercive attacks. However, these systems require additional actions from the voters that may have problems to perform them correctly. In particular, voters under coercion can have problems to defeat coercive attacks by means of fake votes. In this work, we investigate usability issues with regards the voter action when interacting with coercion-resistant election systems. In order to accomplish this and trying to balance usability and security, we performed a set of usability tests using one of these systems as a case study. This system is based on one of the most efficients cryptographic protocols available. Our results show usability problems that might appear when using these systems in realistic elections. In addition, we present recommendations that can help to design more user friendly coercion-resistant systems.","PeriodicalId":314561,"journal":{"name":"Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Usability Considerations For Coercion-Resistant Election Systems\",\"authors\":\"A. Neto, Matheus Leite, Roberto Araújo, M. Mota, N. Neto, Jacques Traoré\",\"doi\":\"10.1145/3274192.3274232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Coercion is an inherent problem of any Internet election. Because voters can vote from any connected place and there is no voting booth to protect them while voting, coercers can easily force them to select their candidates. Although there is no optimal solution for this problem, modern Internet election systems can mitigate it. In other words, these system usually allow voters under coercion to deceive adversaries by casting fake votes. When in safe, voters can vote again; this time, for their legitimate candidates. This idea helps voters to fight coercive attacks. However, these systems require additional actions from the voters that may have problems to perform them correctly. In particular, voters under coercion can have problems to defeat coercive attacks by means of fake votes. In this work, we investigate usability issues with regards the voter action when interacting with coercion-resistant election systems. In order to accomplish this and trying to balance usability and security, we performed a set of usability tests using one of these systems as a case study. This system is based on one of the most efficients cryptographic protocols available. Our results show usability problems that might appear when using these systems in realistic elections. In addition, we present recommendations that can help to design more user friendly coercion-resistant systems.\",\"PeriodicalId\":314561,\"journal\":{\"name\":\"Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3274192.3274232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3274192.3274232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Usability Considerations For Coercion-Resistant Election Systems
Coercion is an inherent problem of any Internet election. Because voters can vote from any connected place and there is no voting booth to protect them while voting, coercers can easily force them to select their candidates. Although there is no optimal solution for this problem, modern Internet election systems can mitigate it. In other words, these system usually allow voters under coercion to deceive adversaries by casting fake votes. When in safe, voters can vote again; this time, for their legitimate candidates. This idea helps voters to fight coercive attacks. However, these systems require additional actions from the voters that may have problems to perform them correctly. In particular, voters under coercion can have problems to defeat coercive attacks by means of fake votes. In this work, we investigate usability issues with regards the voter action when interacting with coercion-resistant election systems. In order to accomplish this and trying to balance usability and security, we performed a set of usability tests using one of these systems as a case study. This system is based on one of the most efficients cryptographic protocols available. Our results show usability problems that might appear when using these systems in realistic elections. In addition, we present recommendations that can help to design more user friendly coercion-resistant systems.