This work presents an attack on the privacy of some voting systems. We show that by combining information from several sources, some of it publicly available, and some of it can be easily collected ad-hoc, an adversary can greatly reduce the size of a voter's anonymity set. In many cases the obtained information is sufficient to deduce the content of a vote (or approximate a small set of possible values).
As a test case, we present this attack in the context of the Israeli general parliamentary elections. Simulations we ran show that we can successfully determine the value of about 50% of the votes after observing three election systems.
|Number of pages||3|
|Publication status||Published - 2013|
|Event||2013 ACM SIGSAC Conference on Computer and Communications Security - Berlin, Germany|
Duration: 4 Nov 2013 → 8 Nov 2013
|Conference||2013 ACM SIGSAC Conference on Computer and Communications Security|
|Period||4/11/13 → 8/11/13|