Addressing the Challenges of e-voting Through Crypto Design
|
|
- Ronald Mills
- 5 years ago
- Views:
Transcription
1 Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University of Edinburgh School of Informatics Workshop
2 When do we actually setup an electronic voting procedure? What is the extent of digitilisation of a traditional election protocol that qualifies as e-voting? 2
3 When do we actually setup an electronic voting procedure? E-voting means the use of electronic means in one of the following three processes: Identification of voters Casting the vote Counting the vote Source: 3
4 When do we actually setup an electronic voting procedure? What is the extent of digitilisation of a traditional election protocol that qualifies as e-voting? Registration Voting Counting Auditing 4
5 Replacing the human protocol with electronic procedures 5
6 Replacing the human protocol with electronic procedures 6
7 Replacing the human protocol with electronic procedures 7
8 Replacing the human protocol with electronic procedures 8
9 Replacing the human protocol with electronic procedures 9
10 The benefits of e-voting Increase the participation of social groups that face considerable physical barriers. Increase the efficiency of the preparation of the election and the calculation of the final results. Reduce the financial cost of the elections (in long term). 10
11 The risks of e-voting Unauthorised intervention of third parties may cause denial of service. Large-scale manipulation by a small group of insiders. Lack of widely agreed standards for the election procedure (infrastructure, software). 11
12 The challenges of e-voting At any point of replacing the traditional protocol with electronic means, extreme care in the algorithmic design, implementation, and execution oversight is required. 12
13 The challenges of e-voting Preserve the fundamental requirements of a voting system. Integrity Privacy Availability 13
14 Addressing e-voting challenges via cryptographic tools Integrity Integrity Privacy Privacy Accessibility Availability 14
15 Modern cryptographic design 1. Understanding and formal definition of the studied notion. 2. Rigorous specification of the threat model. 3. Realisation via a well-described construction. 4. Mathematical proof of the construction s security under the defined threat model. 15
16 Modern cryptography in the real-world Secure internet communication (HTTPS over TLS/SSL, end-to-end encryption). Authentication (Digital signatures, password management). Privacy preservation (aggregate statistics, anonymous web browsing). Blockchain technologies (Bitcoin, Ethereum, smart contracts). 16
17 Modern cryptography in the real-world Secure web browsing. E-banking. . Privacy-preserving profile management. Secure messaging. Decentralised publicly verifiable transactions. 17
18 The necessity of cryptography for realising secure e-voting Collecting, storing and/or communicating sensitive election data overtly, can easily jeopardise election security. Offline (on site): a vote collection device that keeps logs of unencrypted ballot casting can not protect voters privacy when the logs are audited. Online: whenever two devices should interact, secure and authenticated communication must be applied to protect the exchanged data. 18
19 Addressing e-voting challenges via cryptographic tools Integrity Integrity Privacy Privacy Accessibility Availability 19
20 Addressing e-voting challenges via cryptographic tools: Privacy Availability Integrity Privacy 20
21 Ballot secrecy Encryption realises the concept of a digital envelope. The voter s selection is cryptographically sealed. An attacker can not obtain information about the encryption s content (vote selection). 21
22 Voter-vote Unlinkability At some point of the election process, the votes must be anonymised, to prevent coercion and vote-selling. 22
23 Voter-vote Unlinkability Mix-nets: a powerful cryptographic primitive realising vote shuffling in a digital ballot box. Enc(V & ) Enc(V ( ) Enc(V ) ) Mix-net C & C ( C ) C * Enc(V * ) C &, C (, C ), C * = {Enc V &, Enc V (, Enc V ), Enc V * } 23
24 Voter-vote Unlinkability Additive homomorphic tally: a mathematical property of special encryption schemes (E.g. ElGamal, Paillier) that allow for the counting of votes in encrypted manner. Enc X 1 Enc Y = Enc(X + Y) YES NO NO YES 24
25 Voter-vote Unlinkability Additive homomorphic tally: a mathematical property of special encryption schemes (E.g. ElGamal, Paillier) that allow for the counting of votes in encrypted manner. Enc X 1 Enc Y = Enc(X + Y) YES : 2 votes NO : 2 votes 25
26 Voter-vote Unlinkability Anonymous authentication: the voter proves her eligibility via a one-show anonymous credential (e.g. blind signature of the voter s ballot). I am an eligible user and this is my vote I confirm your eligibility and record your vote 26
27 Coercion resistance Concerns about coercion in other types of remote voting (e.g. postal voting) also apply to internet voting. In cases where postal voting is allowed, internet voting could be used, supporting multiple voting as a coercion countermeasure (Estonian e-voting). 27
28 Addressing e-voting challenges via cryptographic tools: Privacy Availability Integrity Privacy 28
29 Addressing e-voting challenges via cryptographic tools: Availability Integrity Privacy Availability 29
30 Usability: making e-voting feasible for every citizen When ballot encoding is applied during vote casting, the voter interacts via a user-friendly interface in a designated voting device, or their browser. Basic familiarity with a standard operating system (e.g., Windows, ios, Android) or web browser (e.g., Edge/Explorer, Safari, Chrome, Firefox) is the only required background. 30
31 Usability: making e-voting feasible for every citizen 31
32 Usability: making e-voting feasible for every citizen 32
33 Usability: making e-voting feasible for every citizen 33
34 Usability: making e-voting feasible for every citizen When code-voting is applied, the voter obtains a ballot with a pre-encoding of the election options (vote-code). 34
35 Usability: making e-voting feasible for every citizen What is your stance on the potential of adopting e-voting for national elections? Serial number: VERY POSITIVE 4 POSITIVE 5 NEUTRAL 2 NEGATIVE 3 VERY NEGATIVE 35
36 Usability: making e-voting feasible for every citizen When code-voting is applied, the voter obtains a ballot with a list of random cryptographic preencoding of the election options (vote-code). The voter simply submits the vote-code that correspond to her option selection, which can be done in lightwight electronic devices. 36
37 Usability: making e-voting feasible for every citizen Serial number: 100 Vote-code: 5 Serial number: VERY POSITIVE 4 POSITIVE 5 NEUTRAL 2 NEGATIVE 3 VERY NEGATIVE 37
38 Usability: making e-voting feasible for every citizen When code-voting is applied, the voter obtains a ballot with a list of random cryptographic preencoding of the election options (vote-code). The voter simply submits the vote-code that correspond to her option selection, which can be done in any electronic device with internet access. In case the voting device is trusted for privacy, vote casting can run via a user-friendly interface. 38
39 Fault tolerance: protecting the election s liveness Threshold cryptography in combination with a distributed system architecture allows for a secure and uninterrupted election access and execution, even when a substantial amount of election servers is not available. 39
40 Addressing e-voting challenges via cryptographic tools: Availability Integrity Privacy Availability 40
41 Addressing e-voting challenges via cryptographic tools: Integrity Privacy Availability Integrity 41
42 Eligibility The authentication/registration authority is equipped with the algorithm that specifies the set of eligible voters. Digital signatures: each voter has an ID-card with an embedded signing key (Estonia). Password-based: the authentication server(s) maintains a cryptographic hash table with all the passwords that correspond to eligible voters. 42
43 End-to-end verifiability Universal level: Any party can verify the correctness of the election transcript. 43
44 End-to-end verifiability Individual level: The voters obtain some audit data in order to verify themselves that their votes were: Cast-as-intended Recorded-as-cast Tallied-as-recorded 44
45 Universal Verifiability Every step of the election procedure is associated with a cryptographic proof of its execution. This is a ballot that encrypts a valid election option π 45
46 Universal Verifiability Every step of the election procedure is associated with a cryptographic proof of its execution. All the cast ballots are encryptions of a valid election option π & π ( π ) π * π 5 46
47 Universal Verifiability Every step of the election procedure is associated with a cryptographic proof of its execution. Enc(V & ) The output ciphertexts are a permutation of exactly the input ciphertexts Enc(V ( ) Enc(V ) ) Mix-net π C & C ( C ) C * Enc(V * ) 47
48 Universal Verifiability Every step of the election procedure is associated with a cryptographic proof of its execution. The decrypted results are a permutation of exactly all eligible recorded votes π C & C ( C ) C * π YES NO YES NO 48
49 Universal Verifiability Each proof satisfies soundness (invalid statements will not be accepted) and prevents any malicious party from leaking information about the associated sensitive data (zeroknowledge proofs). The sequence of cryptographic proofs constitutes a verifiable election transcript that is posted in a publicly accessible web site (bulletin board) for auditing while preserving election privacy. 49
50 Individual Verifiability State-of-the-art e-voting systems support elaborate verification mechanism that allow the voter to challenge the correct encoding of their vote. 1. Ballot encryption: audit the validity of the voting device by randomly checking the local cryptographic operations. 2. Code-voting: audit the honest of the ballot preparation authorities by randomly checking the consistency of the encoding of the election options. 50
51 Accountability The e-voting system should provide a mechanism provides undeniable evidence of which entity is responsible for an incorrect execution. 51
52 Accountability example: authenticated communication 52
53 Accountability example: authenticated communication The voter signs her ballot. Sign π Voter ( ) 53
54 Accountability example: authenticated communication The voter signs her ballot. The vote collection server replies with a signature on the received data. Sign Server ( Sign Voter ( π )) 54
55 Accountability example: authenticated communication The voter signs her ballot. The vote collection server replies with a signature on the received data. If an authority is realized by a distributed subsystem, then malicious nodes can be blacklisted. 55
56 Accountability example: posting on the bulleting board The authorities commit to the validity of their data. The election public key is posted prior to the voting period. The ballot preparation authorities provide cryptographic proofs of proper encoding of the election options (Code-voting). The tallying authorities post cryptographic proofs of correct decryption and election tally. 56
57 Addressing e-voting challenges via cryptographic tools Integrity Integrity Privacy Privacy Accessibility Availability 57
58 Addressing e-voting challenges via cryptographic tools π & π ( Mix-net π π ) π * YES NO YES NO 58
59 Is crypto enough to guarantee secure e-voting? 59
60 The importance of the human factor Cryptographic tools provide a solid background, but do not suffice. Active participation of the stakeholders is crucial. Verification mechanisms are meaningless if not even a small ratio of voters are willing to verify (or outsource verification to a trusted party). The trustees should audit the correct publishing of the election public key to protect voters privacy. A formally analysed human protocol and e-voting cryptographic design should be side-by-side. 60
61 Thank you!!! 61
62 Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University of Edinburgh School of Informatics Workshop
Swiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationCHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationInt. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1
Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,
More informationDesign of Distributed Voting Systems
arxiv:1702.02566v1 [cs.cr] 8 Feb 2017 Design of Distributed Voting Systems Masterarbeit von Christian Meter aus Remscheid vorgelegt am Lehrstuhl für Rechnernetze und Kommunikationssysteme Prof. Dr. Martin
More informationNetvote: A Blockchain Voting Protocol
Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationAn untraceable, universally verifiable voting scheme
An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationBlind Signatures in Electronic Voting Systems
Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationAd Hoc Voting on Mobile Devices
Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013
More informationPrêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia
662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,
More informationPaper-based electronic voting
Paper-based electronic voting Anna Solveig Julia Testaniere Master of Science in Mathematics Submission date: December 2015 Supervisor: Kristian Gjøsteen, MATH Norwegian University of Science and Technology
More informationUncovering the veil on Geneva s internet voting solution
Uncovering the veil on Geneva s internet voting solution The Swiss democratic semi-direct system enables citizens to vote on any law adopted by any authority (communal, cantonal or federal) and to propose
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationThe Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez
The Economist Case Study: Blockchain-based Digital Voting System Team UALR Connor Young, Yanyan Li, and Hector Fernandez University of Arkansas at Little Rock Introduction Digital voting has been around
More informationDistributed Protocols at the Rescue for Trustworthy Online Voting
Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2
More informationIndividual Verifiability in Electronic Voting
Individual Verifiability in Electronic Voting Sandra Guasch Castelló Universitat Politècnica de Catalunya Supervisor: Paz Morillo Bosch 2 Contents Acknowledgements 7 Preface 9 1 Introduction 11 1.1 Requirements
More informationPRIVACY PRESERVING IN ELECTRONIC VOTING
PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District
More informationInternet Voting: Experiences From Five Elections in Estonia
Internet Voting: Experiences From Five Elections in Estonia Priit Vinkel Estonia Abstract: Estonia has been one of the pioneers of Internet Voting by introducing Internet Voting in binding elections in
More informationA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION Manabu Okamoto 1 1 Kanagawa Institute of Technology 1030 Shimo-Ogino, Atsugi, Kanagawa 243-0292, Japan manabu@nw.kanagawa-it.ac.jp ABSTRACT
More informationElectronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013
Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London
More informationAn Introduction to Cryptographic Voting Systems
Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic
More informationCryptographic Voting Protocols: Taking Elections out of the Black Box
Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with
More informationSelectio Helvetica: A Verifiable Internet Voting System
Selectio Helvetica: A Verifiable Internet Voting System Eric Dubuis*, Stephan Fischli*, Rolf Haenni*, Uwe Serdült**, Oliver Spycher*** * Bern University of Applied Sciences, CH-2501 Biel, Switzerland,
More informationOn e-voting and privacy
On e-voting and privacy Jan Willemson UT,Cybernetica On e-voting and privacy p. 1 What is e-voting?? A citizen sits in front of his computer, On e-voting and privacy p. 2 What is e-voting?? A citizen sits
More informationDesign and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System
29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationAn Overview on Cryptographic Voting Systems
ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where
More informationKey Considerations for Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous
More informationProtocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit
1 Public RLA Oversight Protocol Stephanie Singer and Neal McBurnett, Free & Fair Copyright Stephanie Singer and Neal McBurnett 2018 Version 1.0 One purpose of a Risk-Limiting Tabulation Audit is to improve
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationJohns Hopkins University Security Privacy Applied Research Lab
Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631
More informationRunning head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams
Running head: ROCK THE BLOCKCHAIN 1 Rock the Blockchain: Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams University of Maryland University College (UMUC) Author Note Thanks to our UMUC
More informationCitizen engagement and compliance with the legal, technical and operational measures in ivoting
Citizen engagement and compliance with the legal, technical and operational measures in ivoting Michel Chevallier Geneva State Chancellery Setting the stage Turnout is low in many modern democracies Does
More informationUsing Prêt à Voter in Victorian State Elections. EVT August 2012
Using Prêt à Voter in Victorian State Elections EVT August 2012 Craig Burton 1 Chris Culnane 2 James Heather 2 Thea Peacock 3 Peter Y. A. Ryan 3 Steve Schneider 2 Sriram Srinivasan 2 Vanessa Teague 4 Roland
More informationSurvey of Fully Verifiable Voting Cryptoschemes
Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project
More informationPRIVACY in electronic voting
PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis
More informationFormal Verification of Selene with the Tamarin prover
Formal Verification of Selene with the Tamarin prover (E-Vote-ID - PhD Colloquium) Marie-Laure Zollinger Université du Luxembourg October 2, 2018 Marie-Laure Zollinger Formal Verification of Selene with
More informationInternet Voting the Estonian Experience
Internet Voting the Estonian Experience Sven Heiberg sven@cyber.ee Department of Information Security Systems Cybernetica AS Tartu, Estonia Abstract Estonia has offered Internet Voting as a method to participate
More informationAdditional Case study UK electoral system
Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament
More informationL9. Electronic Voting
L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections
More informationPrêt à Voter with Confirmation Codes
Prêt à Voter with Confirmation Codes Peter Y A Ryan, Interdisciplinary Centre for Security and Trust and Dept. Computer Science and Communications University of Luxembourg peter.ryan@uni.lu Abstract A
More informationSecurity Analysis on an Elementary E-Voting System
128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages
More informationElectronic Voting Service Using Block-Chain
Journal of Digital Forensics, Security and Law Volume 11 Number 2 Article 8 2016 Electronic Voting Service Using Block-Chain Kibin Lee Korea University Joshua I. James Hallym University, joshua+jdfsl@dfir.science
More informationAn Object-Oriented Framework for Digital Voting
An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo
More informationA homomorphic encryption-based secure electronic voting scheme
Publ. Math. Debrecen 79/3-4 (2011), 479 496 DOI: 10.5486/PMD.2011.5142 A homomorphic encryption-based secure electronic voting scheme By ANDREA HUSZTI (Debrecen) Dedicated to Professor Attila Pethő and
More informationReceipt-Free Homomorphic Elections and Write-in Voter Verified Ballots
Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI-04-116 Institute for Software Research International and H. John Heinz III School of Public
More informationDESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,
More informationSecurity Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme David Bernhard 1, Oksana Kulyk 2, Melanie Volkamer
More informationPunchscan: Introduction and System Definition of a High-Integrity Election System
Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer
More informationResponse to questions from the Speakers Commission on Digital Democracy regarding electronic voting
Response to questions from the Speakers Commission on Digital Democracy regarding electronic voting 1. What are the potential benefits and drawbacks of online voting (eg, voting via the internet using
More informationElectronic Voting. Mohammed Awad. Ernst L. Leiss
Electronic Voting Mohammed Awad Ernst L. Leiss coscel@cs.uh.edu Partially funded under NSF Grant #1241772 Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors
More informationTrustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17
Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17 IMPORTANT: PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE
More informationOn Some Incompatible Properties of Voting Schemes
This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationM-Vote (Online Voting System)
ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari
More informationOn the Independent Verification of a Punchscan Election
On the Independent Verification of a Punchscan Election Richard T. Carback III Center for Information Security and Assurance, University of Maryland, Balitmore County. carback1@umbc.edu Jeremy Clark School
More informationEvery Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao School of Computing Science Newcastle University, UK feng.hao@ncl.ac.uk Matthew Nicolas Kreeger Thales Information
More informationReceipt-Free Homomorphic Elections and Write-in Ballots
Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti Carnegie Mellon University Posted November 5, 2003 Revised: May 4, 2004 Abstract Abstract. We present a voting protocol that
More informationYes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system?
Sorry. Can you please just say your name? Yes, my name's Priit, head of the Estonian State Election Office. Right. So how secure is Estonia's online voting system? Well, that's such a terrible question.
More informationvvote: a Verifiable Voting System
vvote: a Verifiable Voting System arxiv:1404.6822v4 [cs.cr] 20 Sep 2015 Technical Report Version 4.0 Chris Culnane, Peter Y A Ryan, Steve Schneider and Vanessa Teague Contents Abstract 4 1. Introduction
More informationShould We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College
Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans
More informationTowards Secure Quadratic Voting
Towards Secure Quadratic Voting Sunoo Park Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge, MA 02139 sunoo@mit.edu Ronald L. Rivest Computer Science
More informationPretty Good Democracy for more expressive voting schemes
Pretty Good Democracy for more expressive voting schemes James Heather 1, Peter Y A Ryan 2, and Vanessa Teague 3 1 Department of Computing, University of Surrey, Guildford, Surrey GU2 7XH, UK j.heather@surrey.ac.uk
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationHow to challenge and cast your e-vote
How to challenge and cast your e-vote Sandra Guasch 1, Paz Morillo 2 Scytl Secure Electronic Voting 1, Universitat Politecnica de Catalunya 2 sandra.guasch@scytl.com, paz@ma4.upc.com Abstract. An electronic
More informationRECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY
RECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY TAL MORAN AND MONI NAOR Abstract. We present the first universally verifiable voting scheme that can be based on a general assumption
More informationCity of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013
City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30
More information(12) Patent Application Publication (10) Pub. No.: US 2017/ A1
(19) United States US 20170 109955A1 (12) Patent Application Publication (10) Pub. No.: US 2017/0109955 A1 Ernest et al. (43) Pub. Date: (54) BLOCKCHAIN ELECTRONIC VOTING (52) U.S. Cl. SYSTEMAND METHOD
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.
More informationNevada Republican Party
RESOLUTION # R-104 TO AMEND THE STANDING RULES OF THE NEVADA REPUBLICAN CENTRAL COMMITTEE Summary A resolution to adopt Standing Rules governing the Presidential Preference Poll. A RESOLUTION TO ADOPT
More informationA vvote: a Verifiable Voting System
A vvote: a Verifiable Voting System Chris Culnane, Peter Y.A. Ryan, Steve Schneider and Vanessa Teague 1 1. INTRODUCTION This paper details a design for end-to-end verifiable voting in the Australian state
More informationSMS based Voting System
IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 11 April 2018 ISSN (online): 2349-6010 SMS based Voting System Dr. R. R. Mergu Associate Professor Ms. Nagmani
More informationAuthor(s) Takabatake, Yu; Kotani, Daisuke; Ok.
Title An anonymous distributed electronic Zerocoin Author(s) Takabatake, Yu; Kotani, Daisuke; Ok Citation IEICE Technical Report = 信学技報 (2016 131 Issue Date 2016-11 URL http://hdl.handle.net/2433/217329
More informationRemote Internet voting: developing a secure and efficient frontend
CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February
More informationElectronic Voting Systems
Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationSecured Electronic Voting Protocol Using Biometric Authentication
Advances in Internet of Things, 2011, 1, 38-50 doi:10.4236/ait.2011.12006 Published Online July 2011 (http://www.scirp.org/journal/ait) Secured Electronic Voting Protocol Using Biometric Authentication
More informationCoin-Vote. Abstract: Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf
Coin-Vote Version 0.1 Sunday, 21 June, Year 7 funkenstein the dwarf Abstract: Coin-vote is a voting system for establishing opinion and resolving disputes amongst willing participants. Rather than using
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationAssumption of TOBT Responsibility and Usage Agreement HAM CSA
Assumption of TOBT Responsibility and Usage Agreement HAM CSA (Airport CDM Common Situational Awareness Tool) Please mark with a cross as appropriate! We wish to agree the assumption of TOBT responsibility
More informationTowards a Practical, Secure, and Very Large Scale Online Election
Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,
More information福井大学審査 学位論文 博士 ( 工学 )
福井大学審査 学位論文 博士 ( 工学 A Dissertation Submitted to the University of Fukui for Degree of Doctor of Engineering A Scheme for Electronic Voting Systems 電子投票システムの研究 カジムハマドロキブル Kazi Md. Rokibul アラム Alam 2010
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRADE/C/CEFACT/2013/MISC.2 Distr.: General 17 May 2013 Original: English Economic Commission for Europe Committee on Trade Centre for Trade Facilitation and
More informationDesigning issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.
PAPER ID: IJIFR/V1/E4/019 ISSN (Online):2347-1697 Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer
More informationIncreasing the Trustworthiness of e-voting Systems Using Smart Cards and Digital Certificates Kosovo Case
Increasing the Trustworthiness of e-voting Systems Using Smart Cards and Digital Certificates Kosovo Case BLERIM REXHA RAMADAN DERVISHI VEHBI NEZIRI Faculty of Electrical and Computer Engineering University
More informationTHE PEOPLE S CHOICE. Abstract. system. Team: FireDragon. Team Members: Shoufu Luo*, Jeremy D. Seideman*, Gary Tsai
The Economist Challenge THE PEOPLE S CHOICE A accountable distributed blockchain-based digital voting system Abstract With the advent of Bitcoin and related cryptocurrencies, the blockchain was introduced
More informationDeclaration of Certification Practices Certificates of the General Council of Notaries
Declaration of Certification Practices Certificates of the General Council of Notaries Version: 2.9 Validity: 30/11/2015 1. Overview 1.1. Document control Project: Target entity: Declaration of Certification
More informationEVOTING BY INTRODUCTION THE SWISS POLITICAL CONTEXT
EVOTING BY CHVOTE EVOTING BY INTRODUCTION CHVote is an open source Swiss public online remote voting system (e-voting). It is developed, hosted, operated and owned by the Republic and canton of Geneva.
More informationReceipt-Free Universally-Verifiable Voting With Everlasting Privacy
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran 1 and Moni Naor 1 Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel Abstract.
More information