Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Agora
  4. Coercion Resistance & Anti Vote-Buying Safeguards

Coercion Resistance & Anti Vote-Buying Safeguards

Designing systems so voters cannot prove how they voted.
Back to AgoraView interactive version

The integrity of democratic systems fundamentally depends on the secrecy of the ballot—a principle that protects voters from coercion and prevents the commodification of votes through buying schemes. Traditional paper-based voting systems achieve this through physical separation: voters mark ballots in private booths and deposit them into sealed boxes, making it nearly impossible to prove to a third party how one voted. However, as democratic processes increasingly incorporate digital technologies—from electronic voting machines to internet-based systems—new vulnerabilities emerge. Digital systems can potentially generate cryptographic proofs or digital receipts that would allow voters to demonstrate their choices to coercers or vote buyers, undermining the protective anonymity that secret ballots provide. Coercion resistance and anti vote-buying safeguards represent a sophisticated set of cryptographic protocols and procedural designs specifically engineered to preserve ballot secrecy in digital environments, ensuring that voters cannot produce convincing evidence of their vote choices even if they actively wish to do so.

These safeguards operate through several complementary mechanisms. Receipt-freeness protocols ensure that while voters can verify their votes were counted, they receive no information that could serve as proof to others. Revoting designs allow voters to change their selections multiple times during a voting period, with only the final vote counting—this means any "proof" shown to a coercer could be invalidated by a subsequent secret vote. Carefully designed user interfaces and procedural constraints prevent voters from photographing or recording their selections in ways that would be convincing to third parties. Some advanced cryptographic approaches employ techniques like randomised partial checking or deniable encryption, where voters interact with systems in ways that preserve verifiability for election integrity while preventing the generation of transferable proofs. These mechanisms must balance multiple competing requirements: voters need sufficient assurance that their votes were recorded correctly, election observers require transparency for legitimacy, yet the system must deny voters the ability to prove their specific choices to external parties.

As digital democracy initiatives expand globally—from pilot programs in municipal elections to proposals for national-scale internet voting—the importance of these safeguards becomes increasingly critical. Research communities continue to refine these protocols, with ongoing work addressing challenges like smartphone-based voting where device control presents additional coercion vectors. The stakes are particularly high in contexts where vote buying remains prevalent or where vulnerable populations face systematic intimidation. Early deployments of coercion-resistant systems have appeared in organisational governance and small-scale civic processes, providing valuable insights into user experience challenges and the practical tensions between usability and security. Looking forward, these safeguards will likely become standard requirements for any legitimate digital voting system, as the democratic promise of expanded participation must be balanced against the fundamental need to protect voters from undue influence and preserve the sanctity of individual choice.

TRL
4/9Formative
Impact
5/5
Investment
4/5
Category
ethics-security

Related Organizations

Clr.fund logo
Clr.fund

United States · Open Source

95%

A permissionless, privacy-preserving Quadratic Funding protocol.

Deployer
Privacy Scaling Explorations (PSE) logo
Privacy Scaling Explorations (PSE)

United States · Research Lab

95%

A research group within the Ethereum Foundation focused on zero-knowledge proofs and privacy.

Developer
Cybernetica logo
Cybernetica

Estonia · Company

90%

An Estonian R&D company that developed Sharemind, a secure multiparty computation platform used for government data analysis.

Developer
Vocdoni logo
Vocdoni

Switzerland · Open Source

90%

Builds a privacy-centric, censorship-resistant voting protocol that supports complex governance structures like liquid democracy.

Developer
Aragon logo
Aragon

Switzerland · Open Source

85%

Provides tools to build and manage Decentralized Autonomous Organizations (DAOs) on the blockchain.

Deployer
Assembly logo
Assembly

Denmark · Company

85%

Provider of secure digital voting systems for elections.

Developer
Aztec logo
Aztec

United Kingdom · Startup

80%

Developing a privacy-first zero-knowledge rollup on Ethereum.

Developer
Shutter Network logo
Shutter Network

Switzerland · Open Source

80%

An open-source project using threshold cryptography to prevent front-running.

Developer
NYM Technologies logo
NYM Technologies

Switzerland · Company

75%

Building a privacy infrastructure (mixnet) to prevent data leakage.

Developer
Oasis Protocol Foundation logo
Oasis Protocol Foundation

Switzerland · Nonprofit

75%

A privacy-enabled blockchain platform for open finance and a responsible data economy.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

ethics-security
ethics-security
Sybil-Resistance Mechanisms

Preventing fake identities in digital democracy.

TRL
6/9
Impact
5/5
Investment
5/5
hardware
hardware
Tamper-Evident Voting Kiosks

Secure, transparent hardware for verifiable in-person voting.

TRL
7/9
Impact
5/5
Investment
4/5
software
software
End-to-End Verifiable Voting (E2E-V) Protocols

Cryptographic voting where voters and observers can verify outcomes.

TRL
6/9
Impact
5/5
Investment
5/5
software
software
Homomorphic Tallying Libraries

Counting encrypted votes without decrypting individual ballots.

TRL
5/9
Impact
4/5
Investment
4/5
ethics-security
Threat Modeling & Security Testing for Election Systems

Formal adversary analysis and continuous hardening of civic infrastructure.

TRL
7/9
Impact
5/5
Investment
4/5
hardware
hardware
Offline-First Voting Infrastructure

Hybrid paper-digital systems for low-connectivity contexts.

TRL
6/9
Impact
5/5
Investment
3/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions