Revisiting Silent Coercion

D. Chaum, R. Carback, J. Clark, C. Liu, M. Nejadgholi, B. Preneel, A. T. Sherman, M. Yaksetig, Z. Yin, F. Zagórski, B. Zhang

E-Vote-ID 2025, LNCS 16028, pp. 38–54, Springer (2025)

Revisiting Silent Coercion

Defending Democracy in the Digital Age: Tackling Silent Coercion in Internet Voting

Imagine casting your vote online, confident in your privacy and the integrity of the election. But what if a hidden adversary stole your voting credentials without you ever knowing? They could cast a ballot in your name, and the system—designed to protect your secrecy—would be powerless to distinguish your true intent from the adversary’s. This is the chilling reality of silent coercion, a vulnerability that undermines the promise of secure internet voting. A new research paper, Revisiting Silent Coercion, tackles this problem head-on, offering a cryptographic “safety net” for when secrets are leaked without a voter’s knowledge.

The Silent Threat: When Credentials Leak in the Shadows

Internet voting systems rely on cryptographic keys to authenticate voters and protect ballot secrecy. Traditional coercion-resistance mechanisms (like fake credentials or panic passwords) assume voters can hide these keys from coercers. But what if the key is stolen covertly—say, through malware or device hacking—and the voter never realizes it? The adversary now holds the key, and the system can’t tell the voter apart from the thief. This “silent coercion” scenario renders most existing protections useless. The voter can’t cast their intended vote, and the adversary can manipulate the outcome unchecked.

The paper argues this isn’t just a theoretical risk. As remote voting grows, so does the attack surface for credential theft. Current systems, like Helios, lack defenses here, leaving voters vulnerable to undetected manipulation. The authors frame nullification—allowing voters to invalidate adversarial ballots—as a critical fallback. Instead of accepting defeat, voters can sabotage the stolen vote, ensuring neither they nor the adversary can influence the tally.

Why Nullification Matters: A Failsafe for Leaked Secrets

Nullification isn’t about preventing coercion (that’s what panic passwords or fake credentials do). It’s about recovering from it when secrets are compromised. The paper’s key innovation is a new protocol that lets voters (or trusted helpers) nullify ballots cast with their leaked credentials. Unlike prior solutions like Caveat Coercitor, which discarded conflicting votes (leading to slow, cubic-time tallying), this method uses zero-knowledge proofs and multiparty computation for efficiency. It works as an “overlay” on existing systems, adding protection without replacing them.

The protocol’s brilliance lies in its design: voters encrypt a “flag” vector over all ballots, proving cryptographically that they either:

  1. Flag a ballot as legitimate (using their secret key), or
  2. Nullify it (without revealing details).

This allows the election authority to safely discard adversarial votes while keeping the process fast and scalable. Crucially, nullification doesn’t require voters to be crypto experts—trusted “hedgehogs” (helpers) can act on their behalf.

VoteXX: A Practical System for Real-World Use

To demonstrate the protocol, the authors built VoteXX, a voting system where:

  • Voters use candidate-specific keys (e.g., one for “yes,” one for “no”).
  • A “provisional tally” is published first, then adjusted via nullification.
  • Hedgehogs—semi-trusted helpers (like political parties)—scan the tally for unauthorized votes and nullify them using the voter’s opposite key.

For example, if a voter’s “no” key is stolen and misused, their prearranged hedgehog can nullify that vote using the voter’s “yes” key. This adds a layer of human oversight, making the system resilient even for non-technical users.

Beyond Nullification: The Road Ahead

The paper also highlights complementary solutions:

  • Inalienable authentication: Binding votes to secrets memorized by voters (not devices) to prevent theft.
  • Coercion evidence: Publicly showing the gap between provisional and final tallies to expose interference.
  • Usability: Simplifying complex cryptography for real voters, a persistent challenge.

While the protocol is a major step forward, the authors acknowledge gaps. Integrating nullification with existing systems (like re-voting) and refining hedgehog trust models remain open problems. Yet, by framing silent coercion as a solvable challenge, the work paves the way for more robust internet voting—where democracy isn’t just digital, but trustworthy.

In a world where remote voting is no longer a novelty, protecting voters from invisible threats is non-negotiable. This research doesn’t just patch a hole; it reimagines how we defend the ballot box in the age of invisible coercion. The next chapter of secure voting isn’t just about preventing attacks—it’s about giving voters a way to fight back, even when they don’t know they’re under siege.