Skip to main content

Election Security and Economics: It’s All About Eve

  • Conference paper
  • First Online:
Electronic Voting (E-Vote-ID 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10615))

Included in the following conference series:

Abstract

A system’s security must be understood with respect to the capabilities and behaviors of an adversary Eve. It is often assumed in security analysis that Eve acts as maliciously as possible. From an economic perspective, Eve tries to maximize her utility in a game with other participants. The game’s rules are determined by the system and its security mechanisms, but Eve can invent new ways of interacting with participants. We show that Eve can be used as an interface to explore the interplay between security and economics in the domain of elections. Through examples, we illustrate how reasoning from both disciplines may be combined to explicate Eve’s motives and capabilities and how this analysis could be used for reasoning about the security and performance of elections. We also point to future research directions at the intersection of these disciplines.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The actual table in random sample elections is more involved and also includes information allowing one to ascertain that the right voters have been provided with ballots. We refer to [9] for further details, which are not relevant for this paper.

  2. 2.

    In general, this does not hold for all citizens. A fraction of voters derives positive value from engaging in deliberation and voting.

  3. 3.

    The simple model we consider is different from, yet similar in spirit to, the one considered by [19].

  4. 4.

    Thus we assume that \(|N_3|=0\). This is without loss of generality. Moreover, a full-fledged analysis reveals in our setting that all members of \(N_2\) will apply for decoy votes.

References

  1. Anderson, R.: Why information security is hard - an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 358–365 (2001). http://dl.acm.org/citation.cfm?id=872016.872155

  2. Basin, D., Cremers, C.: Modeling and analyzing security in the presence of compromising adversaries. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 340–356. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_21

    Chapter  Google Scholar 

  3. Basin, D., Cremers, C.: Know your enemy: compromising adversaries in protocol analysis. ACM Trans. Inf. Syst. Secur. 17(2), 7:1–7:31 (2014). http://doi.acm.org/10.1145/2658996

  4. Basin, D., Cremers, C., Meadows, C.: Model checking security protocols. In: Clarke, E., Henzinger, T., Veith, H. (eds.) Handbook of Model Checking. Chap. 24. Springer (to appear, 2017). ISBN: 9783319105741

    Google Scholar 

  5. Basin, D., Radomirovic, S., Schläpfer, M.: A complete characterization of secure human-server communication. In: 2015 IEEE 28th Computer Security Foundations Symposium, pp. 199–213. IEEE Computer Society (2015)

    Google Scholar 

  6. Beilharz, H.J., Gersbach, H.: Voting oneself into a crisis. Macroecon. Dyn. 20(4), 954–984 (2016)

    Article  Google Scholar 

  7. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Workshop on Computer Security Foundations (CSFW 2001), pp. 82–96 (2001). http://dl.acm.org/citation.cfm?id=872752.873511

  8. Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: the commoditization of malware distribution. In: Proceedings of the 20th USENIX Conference on Security (SEC 2011), p. 13. USENIX Association, Berkeley (2011). http://dl.acm.org/citation.cfm?id=2028067.2028080

  9. Chaum, D.: Random-sample voting. http://rsvoting.org/whitepaper/white_paper.pdf. Accessed 7 Jul 2017

  10. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  11. van Eeten, M.J., Bauer, J.M.: Economics of Malware: Security Decisions, Incentives and Externalities. OECD Science, Technology and Industry Working Papers 2008(1) (2008)

    Google Scholar 

  12. Elklit, J., Svensson, P.: What makes elections free and fair? J. Democracy 8(3), 32–46 (1997)

    Article  Google Scholar 

  13. Gersbach, H., Mamageishvili, A., Tejada, O.: Sophisticated Attacks on Decoy Votes. Mimeo (2017)

    Google Scholar 

  14. Gersbach, H., Mühe, F.: Vote-buying and growth. Macroecon. Dyn. 15(5), 656–680 (2011)

    Article  MATH  Google Scholar 

  15. Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 438–457 (2002)

    Article  Google Scholar 

  16. Krasa, S., Polborn, M.K.: Is mandatory voting better than voluntary voting? Games Econ. Behav. 66(1), 275–291 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  17. Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696–701. Springer, Heidelberg (2013). doi:10.1007/978-3-642-39799-8_48

    Chapter  Google Scholar 

  18. Oppliger, R., Schwenk, J., Helbach, J.: Protecting code voting against vote selling. In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss. LNI, vol. 128, pp. 193–204. GI (2008)

    Google Scholar 

  19. Parkes, D.C., Tylkin, P., Xia, L.: Thwarting vote buying through decoy ballots. In: Proceedings of the 16th Conference on Autonomous Agents and Multiagent Systems, pp. 1679–1681. International Foundation for Autonomous Agents and Multiagent Systems (2017)

    Google Scholar 

  20. Schmidt, B., Meier, S., Cremers, C., Basin, D.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: Proceedings of the 2012 IEEE 25th Computer Security Foundations Symposium (CSF 2012), pp. 78–94 (2012). http://dx.doi.org/10.1109/CSF.2012.25

  21. Schweizer Radio und Fernsehen (SRF): Spurensuche nach dem Wahlbetrug im Wallis. https://www.srf.ch/news/schweiz/spurensuche-nach-dem-wahlbetrug-im-wallis. Accessed 22 June 2017

  22. Schweizerische Bundeskanzlei: Anhang zur Verordnung der Bundeskanzlei über die elektronische Stimmabgabe, Inkrafttreten: 15 January 2014. https://www.bk.admin.ch/themen/pore/evoting/07979/index.html?lang=de. Accessed 16 June 2017

  23. Schweizerische Bundeskanzlei: Verordnung der Bundeskanzlei über die elektronische Stimmabgabe, Inkrafttreten: 15 January 2014. https://www.admin.ch/opc/de/classified-compilation/20132343/index.html#app1. Accessed 16 June 2017

  24. Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: Protect: a deployed game theoretic system to protect the ports of the United States. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 13–20. International Foundation for Autonomous Agents and Multiagent Systems (2012)

    Google Scholar 

  25. Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. LEET 11, 4 (2011)

    Google Scholar 

  26. Tages Anzeiger: Wahlbetrug im Oberwallis–30-jähriger Schweizer verhaftet. http://www.tagesanzeiger.ch/schweiz/standard/Wahlbetrug-im-Oberwallis-30jaehriger-Schweizer-verhaftet/story/14197130. Accessed 22 June 2017

  27. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Basin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Basin, D., Gersbach, H., Mamageishvili, A., Schmid, L., Tejada, O. (2017). Election Security and Economics: It’s All About Eve. In: Krimmer, R., Volkamer, M., Braun Binder, N., Kersting, N., Pereira, O., Schürmann, C. (eds) Electronic Voting. E-Vote-ID 2017. Lecture Notes in Computer Science(), vol 10615. Springer, Cham. https://doi.org/10.1007/978-3-319-68687-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68687-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68686-8

  • Online ISBN: 978-3-319-68687-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics