Small coalitions cannot manipulate voting

Edith Elkind*, Helger Lipmaa

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

19 Scopus citations

Abstract

We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm in several important directions: we use one-way functions to close a security loophole that allowed voting officials to exert disproportionate influence on the outcome and show that our hardness results hold against a large fraction of manipulating voters (rather than a single voter). These improvements address important concerns in the field of secure voting systems. We also discuss the limitations of the current approach, showing that it cannot be used to achieve certain very desirable hardness criteria.

Original languageEnglish (US)
Pages (from-to)285-297
Number of pages13
JournalLecture Notes in Computer Science
Volume3570
DOIs
StatePublished - 2005
Externally publishedYes
Event9th International Conference on Financial Cryptography and Data Security, FC 2005 - Roseau, Dominican Republic
Duration: Feb 28 2005Mar 3 2005

Keywords

  • Electronic voting
  • One-way functions
  • Vote manipulation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Small coalitions cannot manipulate voting'. Together they form a unique fingerprint.

Cite this