How efficient are replay attacks against vote privacy? A formal quantitative analysis1
-
Published:2023-07-18
Issue:
Volume:
Page:1-47
-
ISSN:1875-8924
-
Container-title:Journal of Computer Security
-
language:
-
Short-container-title:JCS
Author:
Mestel David1, Müller Johannes1, Reisert Pascal2
Affiliation:
1. Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg 2. Institute of Information Security (SEC), University of Stuttgart, Germany
Abstract
Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real practical elections. Despite their popularity, it is commonly believed that replay attacks are inefficient but the actual threat that they pose to vote privacy has never been studied formally. Therefore, in this paper, we precisely analyze for the first time how efficient replay attacks really are. We study this question from commonly used and complementary perspectives on vote privacy, showing as an independent contribution that a simple extension of a popular game-based privacy definition corresponds to a strong entropy-based notion. Our results demonstrate that replay attacks can be devastating for a voter’s privacy even when an adversary’s resources are very limited. We illustrate our formal findings by applying them to a number of real-world elections, showing that a modest number of replays can result in significant privacy loss. Overall, our work reveals that, contrary to a common belief, replay attacks can be very efficient and must therefore be considered a serious threat.
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software
Reference35 articles.
1. B. Adida, Helios: Web-based open-audit voting, in: Proceedings of the 17th USENIX Security Symposium, San Jose, CA, USA, July 28–August 1, 2008, P.C. van Oorschot, ed., USENIX Association, 2008, pp. 335–348. 2. Measuring Information Leakage Using Generalized Gain Functions 3. SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions 4. D. Bernhard, V. Cortier, O. Pereira and B. Warinschi, Measuring vote privacy, revisited, in: ACM Conference on Computer and Communications Security (CCS 2012), T. Yu, G. Danezis and V.D. Gligor, eds, ACM, 2012, pp. 941–952. 5. D. Bernhard, O. Pereira and B. Warinschi, How not to prove yourself: Pitfalls of the Fiat–Shamir heuristic and applications to helios, in: Advances in Cryptology – ASIACRYPT 2012 – 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2–6, 2012, Proceedings, X. Wang and K. Sako, eds, Lecture Notes in Computer Science, Vol. 7658, Springer, 2012, pp. 626–643.
|
|