DiReCT Voting: Dispute Resolution with Cast Timeliness
Pub. online: 6 January 2026
Type: Research Article
Open Access
Received
1 June 2025
1 June 2025
Accepted
1 December 2025
1 December 2025
Published
6 January 2026
6 January 2026
Abstract
Verification in modern e-voting protocols allows voters and the general public to independently confirm the elections results. However, verification alone is insufficient to hold entities accountable for misconduct, or to protect honest participants from false accusations. This limitation is especially critical in voting protocols with multiple authorities, where the ability to identify the specific misbehaving entity is essential. We present DiReCT, the first multiparty protocol that integrates dispute resolution with individual accountability. Our protocol addresses two previously unresolved disputes: authorities blocking access to the election; and authorities denying the casting of a ballot. In addition, DiReCT improves timeliness, allowing misconducts to be proactively detected during the elections. As a result, voters can identify and recover from attacks that prevent their ballots from being recorded. Notably, DiReCT achieves these capabilities with low trust assumptions on the authorities.
References
Adida, B. (2008). Helios: Web-based open-audit voting. In: USENIX Security Symposium, Vol. 17, pp. 335–348. https://dl.acm.org/doi/10.5555/1496711.1496734.
Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J. (2009). Electing a University President using Open-Audit Voting: analysis of real-world use of Helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections. https://dl.acm.org/doi/10.5555/1855491.1855501.
Aumann, Y., Lindell, Y. (2010). Security against covert adversaries: efficient protocols for realistic adversaries. Journal of Cryptology, 23(2), 281–343. https://doi.org/10.1007/s00145-009-9040-7.
Basin, D., Radomirović, S., Schmid, L. (2020). Dispute resolution in voting. In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), pp. 1–16, 2374-8303. https://doi.org/10.1109/CSF49147.2020.00009.
Bougon, M., Chabanne, H., Cortier, V., Debant, A., Dottax, E., Dreier, J., Gaudry, P., Turuani, M. (2022). Themis: an on-site voting system with systematic cast-as-intended verification and partial accountability. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM, Los Angeles CA USA, pp. 397–410. 978-1-4503-9450-5. https://doi.org/10.1145/3548606.3560563.
Canetti, R. (2001). Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp. 136–145. 1552-5244. https://doi.org/10.1109/SFCS.2001.959888.
Chaum, D. (1983). Blind Signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (Eds.), Advances in Cryptology. Springer US, Boston, MA, pp. 199–203. 978-1-4757-0602-4. https://doi.org/10.1007/978-1-4757-0602-4_18.
Chaum, D.L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–90. https://dl.acm.org/doi/10.1145/358549.358563.
Chaum, D., Essex, A., Carback, R., Clark, J., Popoveniuc, S., Sherman, A., Vora, P. (2008). Scantegrity: end-to-end voter-verifiable optical-scan voting. IEEE Security & Privacy, 6(3), 40–46. https://doi.org/10.1109/MSP.2008.70.
Chen, G., Wu, C., Han, W., Chen, X., Lee, H., Kim, K. (2008). A new receipt-free voting scheme based on linkable ring signature for designated verifiers. In: 2008 International Conference on Embedded Software and Systems Symposia, pp. 18–23. https://doi.org/10.1109/ICESS.Symposia.2008.54.
Clarkson, M.R., Chong, S., Myers, A.C. (2008). Civitas: toward a secure voting system. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 354–368. 2375-1207. https://doi.org/10.1109/SP.2008.32.
Cramer, R., Gennaro, R., Schoenmakers, B. (1997). A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications, 8(5), 481–490. https://doi.org/10.1002/ett.4460080506.
Cramer, R., Franklin, M., Schoenmakers, B., Yung, M. (1996). Multi-authority secret-ballot elections with linear work. In: Maurer, U. (Ed.), Advances in Cryptology — EUROCRYPT ’96. Springer, Berlin, Heidelberg, pp. 72–83. 978-3-540-68339-1. https://doi.org/10.1007/3-540-68339-9_7.
Crimmins, B.L., Rhea, M., Halderman, J.A. (2023). RemoteVote and SAFE Vote: towards usable End-to-End verification for Vote-by-Mail. In: Financial Cryptography and Data Security. FC 2022 International Workshops: CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers. Springer-Verlag, Berlin, Heidelberg, pp. 391–406. 978-3-031-32414-7. https://doi.org/10.1007/978-3-031-32415-4_27.
Cuvelier, E., Pereira, O., Peters, T. (2013). Election verifiability or ballot privacy: do we need to choose? In: Crampton, J., Jajodia, S., Mayes, K. (Eds.), Computer Security – ESORICS 2013. Springer, Berlin, Heidelberg, pp. 481–498. 978-3-642-40203-6. https://doi.org/10.1007/978-3-642-40203-6_27.
Desmedt, Y., Frankel, Y. (1990). Threshold cryptosystems. In: Brassard, G. (Ed.), Advances in Cryptology – CRYPTO’ 89 Proceedings. Springer, New York, NY, pp. 307–315. 978-0-387-34805-6. https://doi.org/10.1007/0-387-34805-0_28.
Doan, T.V.T., Pereira, O., Peters, T. (2025). Threshold receipt-free single-pass eVoting. In: Duenas-Cid, D., Roenne, P., Volkamer, M., Budurushi, J., Blom, M., Rodríguez-Pérez, A., Spycher-Krivonosova, I., Castellà Roca, J., Barrat Esteve, J. (Eds.), Electronic Voting. Springer Nature Switzerland, Cham, pp. 20–36. 978-3-031-72244-8. https://doi.org/10.1007/978-3-031-72244-8_2.
Dolev, D., Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. Conference Name: IEEE Transactions on Information Theory. https://doi.org/10.1109/TIT.1983.1056650.
Duenas-Cid, D. (2024). Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07). In: Proceedings of the 25th Annual International Conference on Digital Government Research, dg.o ’24. Association for Computing Machinery, New York, NY, USA, pp. 669–677. 9798400709883. https://doi.org/10.1145/3657054.3657262.
Fujioka, A., Okamoto, T., Ohta, K. (1993). A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (Eds.), Advances in Cryptology — AUSCRYPT ’92. Springer, Berlin, Heidelberg, pp. 244–251. 978-3-540-47976-5. https://doi.org/10.1007/3-540-57220-1_66.
Furukawa, J., Mori, K., Sako, K. (2010). An implementation of a mix-net based network voting scheme and its use in a private organization. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (Eds.), Towards Trustworthy Elections: New Directions in Electronic Voting. Springer, Berlin, Heidelberg, pp. 141–154. 978-3-642-12980-3. https://doi.org/10.1007/978-3-642-12980-3_8.
Gao, S., Zheng, D., Guo, R., Jing, C., Hu, C. (2019). An anti-quantum E-voting protocol in blockchain with audit function. IEEE Access, 7, 115304–115316. https://doi.org/10.1109/ACCESS.2019.2935895.
Gong, B., Lu, X., Fat, L.W., Au, M.H. (2019). Blockchain-based threshold electronic voting system. In: Meng, W., Furnell, S. (Eds.), Security and Privacy in Social Networks and Big Data. Springer, Singapore, pp. 238–250. 9789811507588. https://doi.org/10.1007/978-981-15-0758-8_18.
Haines, T., Boyen, X. (2016). VOTOR: Australasian Computer Science Week Multiconference, ACSW 2016. In: Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016. Association for Computing Machinery (ACM). https://doi.org/10.1145/2843043.2843362.
Heather, J., Lundin, D. (2009). The append-only web bulletin board. In: Degano, P., Guttman, J., Martinelli, F. (Eds.), Formal Aspects in Security and Trust, Vol. 5491. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 242–256. 978-3-642-01464-2 978-3-642-01465-9. https://doi.org/10.1007/978-3-642-01465-9_16.
Hwang, M.-S., Lee, C.-C., Lai, Y.-C. (2003). An untraceable blind signature scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 86(7), 1902–1906. https://doi.org/10.1109/ICEBE.2006.25.
Iovino, V., Rial, A., Rønne, P.B., Ryan, P.Y.A. (2020). Universal unconditional verifiability in E-voting without trusted parties. In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), pp. 33–48. 2374-8303. https://doi.org/10.1109/CSF49147.2020.00011.
Jakobsson, M., Juels, A., Rivest, R.L. (2002). Making mix nets robust for electronic voting by randomized partial checking. In: 11th USENIX Security Symposium (USENIX Security 02). https://dl.acm.org/doi/10.5555/647253.720294.
Juang, W.-S., Lei, C.-L., Liaw, H.-T. (2002). A verifiable multi-authority secret election allowing abstention from voting. The Computer Journal, 45(6), 672–682. https://doi.org/10.1093/comjnl/45.6.672.
Kiayias, A., Yung, M. (2002). Self-tallying elections and perfect ballot secrecy. In: Naccache, D., Paillier, P. (Eds.), Public Key Cryptography. Springer, Berlin, Heidelberg, pp. 141–158. 978-3-540-45664-3. https://doi.org/10.1007/3-540-45664-3_10.
Kremer, S., Ryan, M., Smyth, B. (2010). Election verifiability in electronic voting protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (Eds.), Computer Security – ESORICS 2010. Springer, Berlin, Heidelberg, pp. 389–404. 978-3-642-15497-3. https://doi.org/10.1007/978-3-642-15497-3_24.
Küsters, R., Liedtke, J., Müller, J., Rausch, D., Vogt, A. (2020). Ordinos: a verifiable tally-hiding E-voting System. In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 216–235. https://doi.org/10.1109/EuroSP48549.2020.00022.
Larriba, A.M., López, D. (2022). SUVS: secure unencrypted voting scheme. Informatica, 33(4), 749–769. https://doi.org/10.15388/22-INFOR503.
Larriba, A.M., Sempere, J.M., López, D. (2020). A two authorities electronic vote scheme. Computers & Security, 97, 101940. https://doi.org/10.1016/j.cose.2020.101940.
Larriba, A.M., Cerdà i Cucó, A., Sempere, J.M., López, D. (2021). Distributed trust, a blockchain election scheme. Informatica, 32(2), 321–355. https://doi.org/10.15388/20-INFOR440.
Lee, B., Kim, K. (2003). Receipt-free electronic voting scheme with a tamper-resistant randomizer. In: Goos, G., Hartmanis, J., Van Leeuwen, J., Lee, P.J., Lim, C.H. (Eds.), Information Security and Cryptology — ICISC 2002, Vol. 2587. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 389–406. 978-3-540-00716-6 978-3-540-36552-5. https://doi.org/10.1007/3-540-36552-4_27.
Li, C.-T., Hwang, M.-S., Lai, Y.-C. (2009). A verifiable electronic voting scheme over the Internet. In: 2009 Sixth International Conference on Information Technology: New Generations, pp. 449–454. https://doi.org/10.1109/ITNG.2009.93.
Moran, T., Naor, M. (2010). Split-ballot voting: everlasting privacy with distributed trust. ACM Transactions on Information and System Security, 13(2), 1–43. https://doi.org/10.1145/1698750.1698756.
Mosaheb, R., Roenne, P., Ryan, P.Y.A., Sarfaraz, S. (2025). Direct and transparent voter verification with everlasting receipt-freeness. In: Electronic Voting, E-Vote-ID 2024. Springer Science and Business Media Deutschland GmbH. 978-3-031-72243-1. https://doi.org/10.1007/978-3-031-72244-8_8.
Nguyen Thi, A.T., Dang, T.K. (2013). Enhanced security in internet voting protocol using blind signatures and dynamic ballots. In: Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS ’12. Association for Computing Machinery, New York, NY, USA, pp. 278–281. 978-1-4503-1306-3. https://doi.org/10.1145/2428736.2428781.
Oechslin, P. (2003). Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (Ed.), Advances in Cryptology – CRYPTO 2003. Springer, Berlin, Heidelberg, pp. 617–630. 978-3-540-45146-4. https://doi.org/10.1007/978-3-540-45146-4_36.
Okamoto, T. (1998). Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (Eds.), Security Protocols. Springer, Berlin, Heidelberg, pp. 25–35. 978-3-540-69688-9. https://doi.org/10.1007/BFb0028157.
Pankova, A., Willemson, J. (2022). Relations between privacy, verifiability, accountability and coercion-resistance in voting protocols. In: Applied Cryptography and Network Security, Vol. 13269. Springer International Publishing, Cham, pp. 313–333. 978-3-031-09233-6 978-3-031-09234-3. https://doi.org/10.1007/978-3-031-09234-3_16.
Pointcheval, D., Sanders, O. (2016). Short randomizable signatures. In: Sako, K. (Ed.), Topics in Cryptology – CT-RSA 2016. Springer International Publishing, Cham, pp. 111–126. 978-3-319-29485-8. https://doi.org/10.1007/978-3-319-29485-8_7.
Ryan, P.Y.A. (2008). Prêt à voter with Paillier encryption. Mathematical and Computer Modelling, 48(9), 1646–1662. https://doi.org/10.1016/j.mcm.2008.05.015.
Sebé, F., Miret, J.M., Pujolàs, J., Puiggalí, J. (2010). Simple and efficient hash-based verifiable mixing for remote electronic voting. Computer Communications, 33(6), 667–675. https://doi.org/10.1016/j.comcom.2009.11.013.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613. https://doi.org/10.1145/359168.359176.
Tornos, J.L., Salazar, J.L., Piles, J.J., Saldana, J., Casadesus, L., Ruiz-Mas, J., Fernandez-Navajas, J. (2014). An eVoting system based on ring signatures. Network Protocols and Algorithms, 6(2), 38–54. https://doi.org/10.5296/npa.v6i2.5390.
Willemson, J. (2023). Analyzing and improving eligibility verifiability of the proposed Belgian remote voting system. In: Rios, R., Posegga, J. (Eds.), Security and Trust Management. Springer Nature Switzerland, Cham, pp. 126–135. 978-3-031-47198-8. https://doi.org/10.1007/978-3-031-47198-8_8.
Yang, X., Yi, X., Ryan, C., van Schyndel, R., Han, F., Nepal, S., Song, A. (2017). A verifiable ranked choice Internet voting system. In: Bouguettaya, A., Gao, Y., Klimenko, A., Chen, L., Zhang, X., Dzerzhinskiy, F., Jia, W., Klimenko, S.V., Li, Q. (Eds.), Web Information Systems Engineering – WISE 2017. Springer International Publishing, Cham, pp. 490–501. 978-3-319-68786-5. https://doi.org/10.1007/978-3-319-68786-5_39.
Yang, X., Yi, X., Nepal, S., Kelarev, A., Han, F. (2018). A secure verifiable ranked choice online voting system based on homomorphic encryption. IEEE Access, 6, 20506–20519. https://doi.org/10.1109/ACCESS.2018.2817518.
Yang, X., Yi, X., Nepal, S., Kelarev, A., Han, F. (2020). Blockchain voting: publicly verifiable online voting protocol without trusted tallying authorities. Future Generation Computer Systems, 112, 859–874. https://doi.org/10.1016/j.future.2020.06.051.
Zou, X., Li, H., Li, F., Peng, W., Sui, Y. (2017). Transparent, auditable, and stepwise verifiable online E-voting enabling an open and fair election. Cryptography, 1(2), 13. https://doi.org/10.3390/cryptography1020013.