{"id":"https://openalex.org/W7148341053","doi":"https://doi.org/10.48550/arxiv.2604.00188","title":"On the Necessity of Pre-agreed Secrets for Thwarting Last-minute Coercion: Vulnerabilities and Lessons From the Loki E-voting Protocol","display_name":"On the Necessity of Pre-agreed Secrets for Thwarting Last-minute Coercion: Vulnerabilities and Lessons From the Loki E-voting Protocol","publication_year":2026,"publication_date":"2026-03-31","ids":{"openalex":"https://openalex.org/W7148341053","doi":"https://doi.org/10.48550/arxiv.2604.00188"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.00188","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00188","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.00188","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132755308","display_name":"Jingxin Qiao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qiao, Jingxin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068797696","display_name":"Myrto Arapinis","orcid":"https://orcid.org/0009-0007-1757-1423"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Arapinis, Myrto","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5031029773","display_name":"Thomas Zacharias","orcid":"https://orcid.org/0000-0002-5022-8543"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zacharias, Thomas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5132755308"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.0035000001080334187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7674000263214111},{"id":"https://openalex.org/keywords/ballot","display_name":"Ballot","score":0.6215000152587891},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6086999773979187},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4174000024795532},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4007999897003174},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.39239999651908875},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.38580000400543213},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.3783000111579895}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8537999987602234},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7674000263214111},{"id":"https://openalex.org/C2777094542","wikidata":"https://www.wikidata.org/wiki/Q905151","display_name":"Ballot","level":4,"score":0.6215000152587891},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6086999773979187},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6033999919891357},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4489000141620636},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4174000024795532},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4007999897003174},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.39239999651908875},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.3783000111579895},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.37439998984336853},{"id":"https://openalex.org/C2777188754","wikidata":"https://www.wikidata.org/wiki/Q5140822","display_name":"Coercion (linguistics)","level":2,"score":0.36250001192092896},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.353300005197525},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.32179999351501465},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.3165999948978424},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.28679999709129333},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.258899986743927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.00188","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00188","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.00188","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00188","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7886837720870972,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Coercion-resistance":[0],"(CR)":[1],"is":[2,104,147,184],"a":[3,17,22,44,52,105,124,132,148,176],"crucial":[4],"security":[5],"property":[6],"in":[7,21,100,131],"e-voting":[8,32,67],"systems.":[9],"It":[10,55],"ensures":[11],"that":[12,47,73,108,134],"an":[13,120,154],"attacker":[14],"cannot":[15,138],"compel":[16],"voter":[18],"to":[19,58,87,122,156,167,174,187,196],"vote":[20],"specific":[23],"way":[24,133],"by":[25,35],"using":[26],"threats":[27],"or":[28],"rewards.":[29],"The":[30,102,144],"Loki":[31],"protocol,":[33,68],"proposed":[34],"Giustolisi":[36],"\\emph{et":[37],"al.}":[38],"at":[39],"IEEE":[40],"S\\&amp;P":[41],"(2024),":[42],"introduces":[43],"novel":[45],"design":[46],"mitigates":[48],"last-minute":[49,189],"coercion":[50],"through":[51],"re-voting":[53],"mechanism.":[54],"also":[56],"aims":[57],"address":[59],"the":[60,64,71,83,110,113,135,171,201,206],"usability":[61],"issues":[62],"of":[63,85,112,128],"seminal":[65],"JCJ":[66],"specifically:":[69],"i)":[70],"requirement":[72],"voters":[74,86],"can":[75],"store":[76],"and":[77,81,204,211],"hide":[78],"pre-agreed":[79,180,197],"credentials,":[80,182],"ii)":[82],"ability":[84],"convincingly":[88],"lie":[89],"while":[90],"being":[91],"coerced.":[92],"In":[93],"this":[94,117],"work,":[95],"we":[96,192],"identify":[97],"two":[98],"vulnerabilities":[99,203],"Loki.":[101],"first":[103],"brute-force":[106],"attack":[107,118,173],"compromises":[109],"integrity":[111,172],"evasion":[114,136],"strategy.":[115],"Specifically,":[116],"allows":[119,153],"adversary":[121,155],"cast":[123],"ballot":[125],"on":[126],"behalf":[127],"their":[129,159,164],"victim":[130,160],"strategy":[137],"defend":[139],"against,":[140],"rendering":[141],"it":[142,183],"ineffective.":[143],"second":[145],"vulnerability":[146],"forced":[149],"abstention":[150],"attack,":[151],"which":[152],"detect":[157],"when":[158],"has":[161],"complied":[162],"with":[163],"instruction":[165],"not":[166,185],"vote.":[168],"We":[169],"generalise":[170],"reveal":[175],"fundamental":[177],"dilemma:":[178],"without":[179],"secret":[181,198],"possible":[186],"prevent":[188],"coercion.":[190],"Finally,":[191],"show":[193],"how":[194],"reverting":[195],"credentials":[199],"fixes":[200],"aforementioned":[202],"discuss":[205],"trade-off":[207],"between":[208],"tallying":[209],"efficiency":[210],"stronger":[212],"trust":[213],"assumptions.":[214]},"counts_by_year":[],"updated_date":"2026-04-03T16:44:17.987007","created_date":"2026-04-03T00:00:00"}
