Project Details
Description
One of the prominent challenges in Internet voting is voter coercion: if the voters cast their votes from an unprotected environment, the coercer can observe the voter during voting and ensure that the voter obeys the coercer's instructions. Existing cryptographic protocols protect against this kind of coercion. However, they rely on additional steps on behalf of the voter that are known to be too
complicated and therefore hardly usable. In the UCORV project, I apply methods from the humancentered security and privacy field to design voting systems that are both usable and coercionresistant.
This is done by (a) involving the user at different stages of designing such systems via empirical studies, and (b) integrating the insights from related research in human factors in securitycritical systems, such as usable authentication. The results of the project have the potential to revolutionize secure elections, as well as empower users in other contexts where coercion poses a threat.
complicated and therefore hardly usable. In the UCORV project, I apply methods from the humancentered security and privacy field to design voting systems that are both usable and coercionresistant.
This is done by (a) involving the user at different stages of designing such systems via empirical studies, and (b) integrating the insights from related research in human factors in securitycritical systems, such as usable authentication. The results of the project have the potential to revolutionize secure elections, as well as empower users in other contexts where coercion poses a threat.
| Acronym | UCORV |
|---|---|
| Status | Active |
| Effective start/end date | 01/07/2023 → 30/06/2027 |
Collaborative partners
- IT University of Copenhagen (lead)
- Karlsruhe Institute of Technology
- University of Luxembourg
Funding
- Independent Research Fund Denmark: DKK2,842,808.00
Keywords
- Elections
- Electronic Voting
- cyber security
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
-
The Password You Hope You Never Use: Use Cases for Duress Authentication
Nissen, C. F. & Kulyk, O., 17 Oct 2025, Companion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing. New York, USA : Association for Computing Machinery, p. 435 - 439 5 p.Research output: Conference Article in Proceeding or Book/Report chapter › Conference abstract in proceedings › Research › peer-review
Open AccessFile -
Voting Under Pressure: Perceptions of Counter-Strategies in Internet Voting
Nissen, C. F., Hilt, T., Budurushi, J., Volkamer, M. & Kulyk, O., 2025, International Joint Conference on Electronic Voting. Cham: Springer Nature Switzerland, 17 p.Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
File