COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

Size: px
Start display at page:

Download "COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES"

Transcription

1 UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006

2 TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 Towards an Engineering Approach to Component Adaptation P. Y. A. Ryan Abstract Voter Verified Paper Audit Trails (VVPAT) have been proposed as a mechanism to try to make touch screen style voting devices more trustworthy, e.g., \cite{mercuri02:e-vote}. We propose an analogous mechanism in cryptographic schemes that use encrypted receipts and argue that such a mechanism can yield considerable benefits, significantly greater in fact than the benefits of VVPAT in conventional voting systems that use plaintext ballots University of Newcastle upon Tyne. Printed and published by the University of Newcastle upon Tyne, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England.

3 Bibliographical details RYAN, P. Y. A.. Verified Encrypted Paper Audit Trails [By] P. Y. A. Ryan. Newcastle upon Tyne: University of Newcastle upon Tyne: Computing Science, (University of Newcastle upon Tyne, Computing Science, Technical Report Series, No. CS-TR-966) Added entries UNIVERSITY OF NEWCASTLE UPON TYNE Computing Science. Technical Report Series. CS-TR-966 Abstract Voter Verified Paper Audit Trails (VVPAT) have been proposed as a mechanism to try to make touch screen style voting devices more trustworthy, e.g., \cite{mercuri02:e-vote}. We propose an analogous mechanism in cryptographic schemes that use encrypted receipts and argue that such a mechanism can yield considerable benefits, significantly greater in fact than the benefits of VVPAT in conventional voting systems that use plaintext ballots. About the author Peter Ryan is a Professor of CSR. He is responsible for the security and privacy aspects of the DIRC program and is involved in the European MAFTIA project. Prior to joining the CSR, he conducted research in formal methods and information assurance at GCHQ, CESG, DERA, SRI Cambridge, the Norwegian Computing Centre Oslo and the Software Engineering Institute, Carnegie Mellon University. Before migrating into information assurance he was a theoretical physicist and holds a BSc in Theoretical Physics and a PhD in Mathematical Physics from the University of London for research in quantum gravity. He has published numerous articles; the most recent being "Mathematical Models of Computer Security," a chapter in LNCS 2171, is based on lectures given at the FOSAD 2000 Summer School. He is co-author of the book "Modelling and Analysis of Security Protocols," Pearson Suggested keywords VERIFIED VOTING, ENCRYPTED BALLOT FORMS

4 Verified Encrypted Paper Audit Trails P Y A Ryan Abstract Voter Verified Paper Audit Trails (VVPAT) have been proposed as a mechanism to try to make touch screen style voting devices more trustworthy, e.g., [3]. We propose an analogous mechanism in cryptographic schemes that use encrypted receipts and argue that such a mechanism can yield considerable benefits, significantly greater in fact than the benefits of VVPAT in conventional voting systems that use plaintext ballots. 1 Introduction With simple touch screen voting devices, the absence of any form of audit trail to fall back on prompted many voting experts in the US to advocate the use of a Voter Verified Paper Audit Trail (VVPAT) mechanism, e.g., [3]. At the time of casting the vote, the voter gets to witness the generation of a paper record of their vote. This record is carefully handled to minimise threats of manipulation by either the voters or the officials. A well known implementation of this concept is the Mercuri method, [3], in which the voter sees a printout of their vote under glass. If they confirm that this is correct, the vote is electronically recorded and the paper copy is conveyed to an audit box. It is not the purpose of this note to examine whether such mechanisms really make touch screen voting significantly more trustworthy. Rather we will describe how a similar mechanism can be used in conjunction with a cryptographic voting system, such as Prêt à Voter, and argue that this delivers clear and significant benefits. In fact, used in conjunction with encrypted ballots, a paper audit trail mechanism works far more effectively Newcastle University 1

5 than when plaintext ballots are used. We call this mechanism a Verified Encrypted Paper Audit Trail, VEPAT for short. It should be noted that this idea has been mentioned, in passing, in previous publications, e.g., [4]. However, we feel that the notion is sufficiently significant to warrant further elaboration in a small note. 2 Verified Encrypted Paper Audit Trail For the purposes of this description we will use the Prêt à Voter scheme to illustrate the concept, but in fact any scheme using encrypted ballots would work. We refer the reader to [7], [1] for details of Prêt à Voter. Recall the key steps of the vote casting process for Prêt à Voter: the voter enters the polling station, chooses a ballot form at random, goes to the booth and makes her selection. She emerges from the booth with her encrypted receipt and approaches the vote casting desk. Here her identity and legitimacy is checked by the polling officials. Assuming that this is okay, a scan is made of the receipt and a digital copy is stored for eventual posting to a secure web bulletin board once the election has closed. To add a VEPAT mechanism to the above procedure we simply generate an additional paper copy of the receipt at the same time as the digital copy. The accuracy of this paper audit copy can be checked by the voter and officials overseeing the vote casting and they can witness this copy being deposited in a secure audit box. The lodging of the paper audit copy could follow the Mercuri method for example, but this may not be necessary given that the creation of the paper copy and depositing of it in the audit box can be witnessed by the voter and officials. So far this is very similar to the conventional VVPAT process. However there are some crucial differences. As the receipts are encrypted at the point of casting, the creation of the paper audit copy can be performed under the supervision of polling officials rather than having to be done by the voter in the isolation of the booth. The paper audit copy can thus be verified by both the voter and officials. Furthermore, in the event of a problem, i.e., the paper copy not being an accurate copy of the receipt, remedial action can be taken without jeopardizing the privacy of the vote. The fact that the receipts are encrypted also means that there is no problem keeping the audit trail in the form of a continuous, till receipt like, roll. With conventional VVPAT, this is problematic given that the record 2

6 of the votes are in the clear: anyone monitoring the order in which people enter the booth and having access subsequently to the audit trail could potentially correlate voters and votes. This usually means that VVPAT must be implemented in such a way as to ensure that the records of each individual vote is separated and shuffled, by for example cutting each ballot copy from the roll. This leads to technological problems and malfunctioning mechanisms etc. It also looses the major advantage of a till receipt: such an audit trail is extremely difficult to manipulate. 3 Benefits Such a paper audit trail using encrypted receipts, such as those used in Prêt à Voter, provides a number of benefits. A robust, manipulation-resistant physical audit trail to which one could fall back in the event of the material on the WBB being called into question. Whilst it is true that for voter-verified schemes, the voters collectively hold a paper audit trail, it is clear that it would be difficult to invoke this as a fall-back in the event of serious problems. Firstly, some voters might not retain their receipts and, secondly, trying to gather together all voter held receipts would be unwieldy and impractical. An objection that is frequently raised against voter-verifiable schemes is that it is likely that the majority of voters would not bother to check their receipt on the WBB. Establishing likely levels of voter diligence is something that will require investigation, but, in ny event, having a VEPAT in place allows us to supplement voter checks by checks performed by independent auditing authorities. Thus, organizations like the Electoral Reform Society could routinely make checks of the correspondence between the audit trail and the receipts posted to the WBB. This would also help counter vote stuffing threats. The above observation also helps counter such threats as discarded receipts and receipts buying, see [2], [6], [5]. The threat here is that an adversary may be able to identify discarded receipts and so deduce that the corresponding receipts on the WBB can be altered without fear of detection. Alternatively, the adversary might be more pro-active and try to purchase receipts, as suggested by Rivest, [5]. With a VEPAT in place, even if receipts are discarded or purchased, there is still the possibility (or even certainty depending on how the checks are implemented) that their presence on the WBB will be checked by the organizations assigned to the task. 3

7 It is worth considering whether the idea should be taken even further and used to replace the voter retained receipts altogether. This would seem to be in violation of the principle of enabling the voters themselves to verify the inclusion of their vote in the tally. However, if a sufficient number of publicly respected and trusted independent (mutually hostile?) organizations were allowed access to the audits, this might provide a reasonable compromise. It is sometimes argued that if voters lack confidence in the ability of the encryption mechanism to protect the privacy of their vote they might be discouraged from voting or open to coercion. Indeed, a possible attack is exploit such concerns and claim (falsely) to be able to extract votes from receipts and use this to coerce gullible voters. Doing away with the voter retained receipts would avoid this objection. The opinion of the author is that it is better to address the confidence issue, but the question deserves to be raised and further discussed. Another approach to addressing this concern is the idea of enabling or enforcing ballot or receipt exchange, [5]. There do appear to be a number of problems with the approach but discussion of this is beyond the scope of this note. 4 Conclusions We have proposed the idea of a Verified, Encrypted Paper Audit Trail (VEPAT) analogous to the VVPAT mechanism previously proposed for touch screen voting machines. We have argued that, when used in conjunction with schemes employing encrypted ballots, for example Prêt à Voter, such a mechanism is in fact significantly more effective than as originally conceived for use with plaintext ballots. This is due mainly to the fact that, in contrast to the original VVPAT concept, a VEPAT can be implemented using till-receipt style, continuous rolls, resulting in manipulation resistant audit trails. The possibility of replacing voter held receipts by a VEPAT mechanism along with rigorous checking of the correspondence between the audit trail and the WBB by publicly trusted organisations has been raised. 4

8 5 Acknowledgements I should like to thank the members of the Newcastle Security Group and Ian Brown for useful comments. References [1] D. Chaum, P.Y.A. Ryan, and S. Schneider. A practical, voter-verifiable election scheme. In European Symposium on Research in Computer Security, number 3679 in Lecture Notes in Computer Science. Springer- Verlag, [2] C. Karlof, N. Sastry, and D. Wagner. Cryptographic voting protocols: A systems perspective. In USENIX Security Symposium, number 3444 in Lecture Notes in Computer Science, pages Springer-Verlag, [3] R. Mercuri. A better ballot box? IEEE Spectrum Online, October [4] B. Randell and P.Y.A. Ryan. Voting technologies and trust. IEEE Security & Privacy, To appear. [5] R. L. Rivest. The threeballot voting system. rivest/rivest- TheThreeBallotVotingSystem.pdf. [6] P.Y.A. Ryan and T. Peacock. Prêt à voter: a systems perspective. Technical Report CS-TR-929, University of Newcastle upon Tyne, [7] P.Y.A. Ryan and S. A. Schneider. Prêt à voter with re-encryption mixes. In European Symposium on Research in Computer Security, number 4189 in Lecture Notes in Computer Science. Springer-Verlag,

COMPUTING SCIENCE. University of Newcastle upon Tyne. Pret a Voter with a Human-Readable, Paper Audit Trail. P. Y. A. Ryan. TECHNICAL REPORT SERIES

COMPUTING SCIENCE. University of Newcastle upon Tyne. Pret a Voter with a Human-Readable, Paper Audit Trail. P. Y. A. Ryan. TECHNICAL REPORT SERIES UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Pret a Voter with a Human-Readable, Paper Audit Trail P. Y. A. Ryan. TECHNICAL REPORT SERIES No. CS-TR-1038 July, 2007 TECHNICAL

More information

Human readable paper verification of Prêt à Voter

Human readable paper verification of Prêt à Voter Human readable paper verification of Prêt à Voter David Lundin and Peter Y. A. Ryan d.lundin@surrey.ac.uk, University of Surrey, Guildford, UK peter.ryan@ncl.ac.uk, University of Newcastle upon Tyne, UK

More information

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical

More information

TECHNICAL REPORT SERIES. No. CS-TR-1071 February, Human readable paper verification of Pret a Voter. David Lundin and Peter Y. A. Ryan.

TECHNICAL REPORT SERIES. No. CS-TR-1071 February, Human readable paper verification of Pret a Voter. David Lundin and Peter Y. A. Ryan. COMPUTING SCIENCE Human readable paper verification of Pret a Voter D. Lundin and P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-1071 February, 2008 TECHNICAL REPORT SERIES No. CS-TR-1071 February, 2008

More information

Voting Protocol. Bekir Arslan November 15, 2008

Voting Protocol. Bekir Arslan November 15, 2008 Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong

More information

An Overview on Cryptographic Voting Systems

An Overview on Cryptographic Voting Systems ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where

More information

The usage of electronic voting is spreading because of the potential benefits of anonymity,

The usage of electronic voting is spreading because of the potential benefits of anonymity, How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic

More information

Swiss E-Voting Workshop 2010

Swiss E-Voting Workshop 2010 Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability

More information

A Secure Paper-Based Electronic Voting With No Encryption

A Secure Paper-Based Electronic Voting With No Encryption A Secure Paper-Based Electronic Voting With No Encryption Asghar Tavakoly, Reza Ebrahimi Atani Department of Computer Engineering, Faculty of engineering, University of Guilan, P.O. Box 3756, Rasht, Iran.

More information

The Effectiveness of Receipt-Based Attacks on ThreeBallot

The Effectiveness of Receipt-Based Attacks on ThreeBallot The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,

More information

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV G B + + B - Ballot Ballot Box Mixer Receipt ThreeBallot, VAV, and Twin Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV Talk at EVT 07 (Boston) August 6, 2007 Outline End-to-end voting systems ThreeBallot

More information

Accessible Voter-Verifiability

Accessible Voter-Verifiability Cryptologia, 33:283 291, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190902894946 Accessible Voter-Verifiability DAVID CHAUM, BEN HOSP, STEFAN POPOVENIUC, AND POORVI

More information

A Verifiable Voting Protocol based on Farnel

A Verifiable Voting Protocol based on Farnel A Verifiable Voting Protocol based on Farnel Roberto Araújo 1, Ricardo Felipe Custódio 2, and Jeroen van de Graaf 3 1 TU-Darmstadt, Hochschulstrasse 10, 64289 Darmstadt - Germany rsa@cdc.informatik.tu-darmstadt.de

More information

Using Prêt à Voter in Victorian State Elections. EVT August 2012

Using Prêt à Voter in Victorian State Elections. EVT August 2012 Using Prêt à Voter in Victorian State Elections EVT August 2012 Craig Burton 1 Chris Culnane 2 James Heather 2 Thea Peacock 3 Peter Y. A. Ryan 3 Steve Schneider 2 Sriram Srinivasan 2 Vanessa Teague 4 Roland

More information

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia 662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,

More information

Secure Voter Registration and Eligibility Checking for Nigerian Elections

Secure Voter Registration and Eligibility Checking for Nigerian Elections Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017

More information

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

Direct Recording Electronic Voting Machines

Direct Recording Electronic Voting Machines Direct Recording Electronic Voting Machines This Act sets standards for direct recording electronic voting machines (DREs). As of July 1, 2005, DREs must, among other things: produce a voter-verified paper

More information

Prêt à Voter: a Systems Perspective

Prêt à Voter: a Systems Perspective Prêt à Voter: a Systems Perspective Peter Y. A. Ryan and Thea Peacock September 20, 2005 Abstract Numerous cryptographic voting schemes have been proposed in recent years. Many of these have highly desirable

More information

Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema

Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema Dermot Cochran IT University Technical Report Series TR-2015-189 ISSN 1600-6100 August 2015 Copyright 2015,

More information

The E-voting Controversy: What are the Risks?

The E-voting Controversy: What are the Risks? Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April

More information

vvote: a Verifiable Voting System

vvote: a Verifiable Voting System vvote: a Verifiable Voting System arxiv:1404.6822v4 [cs.cr] 20 Sep 2015 Technical Report Version 4.0 Chris Culnane, Peter Y A Ryan, Steve Schneider and Vanessa Teague Contents Abstract 4 1. Introduction

More information

Prêt à Voter with Confirmation Codes

Prêt à Voter with Confirmation Codes Prêt à Voter with Confirmation Codes Peter Y A Ryan, Interdisciplinary Centre for Security and Trust and Dept. Computer Science and Communications University of Luxembourg peter.ryan@uni.lu Abstract A

More information

A vvote: a Verifiable Voting System

A vvote: a Verifiable Voting System A vvote: a Verifiable Voting System Chris Culnane, Peter Y.A. Ryan, Steve Schneider and Vanessa Teague 1 1. INTRODUCTION This paper details a design for end-to-end verifiable voting in the Australian state

More information

Towards Trustworthy e-voting using Paper Receipts

Towards Trustworthy e-voting using Paper Receipts Towards Trustworthy e-voting using Paper Receipts Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho Won Information Security Group, Sungkyunkwan University, 00 Cheoncheon-dong, Suwon-si, Gyeonggi-do, 0-76,

More information

E- Voting System [2016]

E- Voting System [2016] E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com

More information

An Introduction to Cryptographic Voting Systems

An Introduction to Cryptographic Voting Systems Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic

More information

Privacy Issues in an Electronic Voting Machine

Privacy Issues in an Electronic Voting Machine Privacy Issues in an Arthur M. Keller UC Santa Cruz and Open Voting Consortium David Mertz Gnosis Software Joseph Lorenzo Hall UC Berkeley Arnold Urken Stevens Institute of Technology Outline Secret ballot

More information

L9. Electronic Voting

L9. Electronic Voting L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections

More information

Risk-Limiting Audits

Risk-Limiting Audits Risk-Limiting Audits Ronald L. Rivest MIT NASEM Future of Voting December 7, 2017 Risk-Limiting Audits (RLAs) Assumptions What do they do? What do they not do? How do RLAs work? Extensions References (Assumption)

More information

Security Analysis on an Elementary E-Voting System

Security Analysis on an Elementary E-Voting System 128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages

More information

Key Considerations for Oversight Actors

Key Considerations for Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous

More information

Every electronic device used in elections operates and interacts

Every electronic device used in elections operates and interacts MONITORING ELECTRONIC TECHNOLOGIES IN ELECTORAL PROCESSES 13 CHAPTER TWO: Introduction to Electronic Technologies in Elections INTRODUCTION Every electronic device used in elections operates and interacts

More information

Privacy of E-Voting (Internet Voting) Erman Ayday

Privacy of E-Voting (Internet Voting) Erman Ayday Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken

More information

Cryptographic Voting Protocols: Taking Elections out of the Black Box

Cryptographic Voting Protocols: Taking Elections out of the Black Box Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with

More information

Arthur M. Keller, Ph.D. David Mertz, Ph.D.

Arthur M. Keller, Ph.D. David Mertz, Ph.D. Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers

More information

Addressing the Challenges of e-voting Through Crypto Design

Addressing the Challenges of e-voting Through Crypto Design Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et

More information

A Robust Electronic Voting Scheme Against Side Channel Attack

A Robust Electronic Voting Scheme Against Side Channel Attack JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 7-86 (06) A Robust Electronic Voting Scheme Against Side Channel Attack YI-NING LIU, WEI GUO HI CHENG HINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi

More information

Machine-Assisted Election Auditing

Machine-Assisted Election Auditing Machine-Assisted Election Auditing Joseph A. Calandrino *, J. Alex Halderman *, and Edward W. Felten *, * Center for Information Technology Policy and Dept. of Computer Science, Princeton University Woodrow

More information

Ballot Reconciliation Procedure Guide

Ballot Reconciliation Procedure Guide Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most

More information

An untraceable, universally verifiable voting scheme

An untraceable, universally verifiable voting scheme An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect

More information

A paramount concern in elections is how to regularly ensure that the vote count is accurate.

A paramount concern in elections is how to regularly ensure that the vote count is accurate. Citizens Audit: A Fully Transparent Voting Strategy Version 2.0b, 1/3/08 http://e-grapevine.org/citizensaudit.htm http://e-grapevine.org/citizensaudit.pdf http://e-grapevine.org/citizensaudit.doc We welcome

More information

INFORMATION TO VOTERS

INFORMATION TO VOTERS Notice of Spring Election and Sample Ballots April 4, 2017 OFFICE OF THE KENOSHA COUNTY CLERK TO THE VOTERS OF KENOSHA COUNTY: Notice is hereby given of a spring primary election to be held in County of

More information

Key Considerations for Implementing Bodies and Oversight Actors

Key Considerations for Implementing Bodies and Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made

More information

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System 29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu

More information

Can Our Election Systems be Trusted?

Can Our Election Systems be Trusted? Can Our Election Systems be Trusted? Talk at the 2018 CyberMaryland Conference, Oct. 10, 2018 Balakrishnan Dasarathy, PhD Professor & Program Chair, Cybersecurity & Information Assurance Department Graduate

More information

PRIVACY PRESERVING IN ELECTRONIC VOTING

PRIVACY PRESERVING IN ELECTRONIC VOTING PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District

More information

Good morning. I am Don Norris, Professor of Public Policy and Director of the

Good morning. I am Don Norris, Professor of Public Policy and Director of the Testimony of Donald F. Norris before the U. S. House of Representatives Committee on House Administration, Subcommittee on Elections Friday, March 23, 2007 Madam Chairperson and members of the Committee,

More information

Punchscan: Introduction and System Definition of a High-Integrity Election System

Punchscan: Introduction and System Definition of a High-Integrity Election System Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer

More information

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

Secure and Reliable Electronic Voting. Dimitris Gritzalis

Secure and Reliable Electronic Voting. Dimitris Gritzalis Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote

More information

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans

More information

evoting after Nedap and Digital Pen

evoting after Nedap and Digital Pen evoting after Nedap and Digital Pen Why cryptography does not fix the transparency issues Ulrich Wiesner 25C3, Berlin, 29 th December 2008 Agenda Why is evoting an issue? Physical copies, paper trail?

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

Johns Hopkins University Security Privacy Applied Research Lab

Johns Hopkins University Security Privacy Applied Research Lab Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631

More information

Software Independence

Software Independence Software Independence Alec Yasinsac Co-Director, Security and Assurance in Information Technology Laboratory Florida State University Tallahassee, Florida 32306-4530 December 11, 2007 Abstract Software

More information

L14. Electronic Voting

L14. Electronic Voting L14. Electronic Voting Alice E. Fischer October 28, 2014 Voting... 1/14 What is all the fuss about? Voting Systems Public Voting is Different On-Site and Off-site Voting Voting... 2/14 What is all the

More information

Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett

Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb 2018 -- Neal McBurnett Overview of the Journey Post-Election Audits are Important How Traditional Audits Work Why RLA is better Definitions

More information

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes. Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other

More information

Distributed Protocols at the Rescue for Trustworthy Online Voting

Distributed Protocols at the Rescue for Trustworthy Online Voting Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2

More information

Introduction of Electronic Voting In Namibia

Introduction of Electronic Voting In Namibia Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background

More information

COMMISSION CHECKLIST FOR NOVEMBER GENERAL ELECTIONS (Effective May 18, 2004; Revised July 15, 2015)

COMMISSION CHECKLIST FOR NOVEMBER GENERAL ELECTIONS (Effective May 18, 2004; Revised July 15, 2015) COMMISSION CHECKLIST FOR NOVEMBER GENERAL ELECTIONS (Effective May 18, 2004; Revised July 15, 2015) This checklist is provided by the State Board of Election Commissioners as a tool for capturing and maintaining

More information

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,

More information

Security of Voting Systems

Security of Voting Systems Security of Voting Systems Ronald L. Rivest MIT CSAIL Given at: Collège de France March 23, 2011 Outline Voting technology survey What is being used now? Voting Requirements Security Threats Security Strategies

More information

IN-POLL TABULATOR PROCEDURES

IN-POLL TABULATOR PROCEDURES IN-POLL TABULATOR PROCEDURES City of London 2018 Municipal Election Page 1 of 32 Table of Contents 1. DEFINITIONS...3 2. APPLICATION OF THIS PROCEDURE...7 3. ELECTION OFFICIALS...8 4. VOTING SUBDIVISIONS...8

More information

PRIVACY in electronic voting

PRIVACY in electronic voting PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis

More information

On Some Incompatible Properties of Voting Schemes

On Some Incompatible Properties of Voting Schemes This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties

More information

An Object-Oriented Framework for Digital Voting

An Object-Oriented Framework for Digital Voting An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo

More information

An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 1

An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 1 An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 1 April 15, 2006 Alan T. Sherman*, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru,

More information

How do I know my vote is safe?

How do I know my vote is safe? Report on Montana Election Security Prepared for the 2019 Montana Legislature By the League of Women Voters Montana December 17, 2018 INTRODUCTON Recent news that foreign governments tried to tamper with

More information

Procedures for the Use of Optical Scan Vote Tabulators

Procedures for the Use of Optical Scan Vote Tabulators Procedures for the Use of Optical Scan Vote Tabulators (Revised December 4, 2017) CONTENTS Purpose... 2 Application. 2 Exceptions. 2 Authority. 2 Definitions.. 3 Designations.. 4 Election Materials. 4

More information

Paper-based electronic voting

Paper-based electronic voting Paper-based electronic voting Anna Solveig Julia Testaniere Master of Science in Mathematics Submission date: December 2015 Supervisor: Kristian Gjøsteen, MATH Norwegian University of Science and Technology

More information

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao School of Computing Science Newcastle University, UK feng.hao@ncl.ac.uk Matthew Nicolas Kreeger Thales Information

More information

Allegheny Chapter. VotePA-Allegheny Report on Irregularities in the May 16 th Primary Election. Revision 1.1 of June 5 th, 2006

Allegheny Chapter. VotePA-Allegheny Report on Irregularities in the May 16 th Primary Election. Revision 1.1 of June 5 th, 2006 Allegheny Chapter 330 Jefferson Dr. Pittsburgh, PA 15228 www.votepa.us Contact: David A. Eckhardt 412-344-9552 VotePA-Allegheny Report on Irregularities in the May 16 th Primary Election Revision 1.1 of

More information

Volume I Appendix A. Table of Contents

Volume I Appendix A. Table of Contents Volume I, Appendix A Table of Contents Glossary...A-1 i Volume I Appendix A A Glossary Absentee Ballot Acceptance Test Ballot Configuration Ballot Counter Ballot Counting Logic Ballot Format Ballot Image

More information

Abstract: We present a modular voting architecture in which vote generation is performed separately from vote casting.

Abstract: We present a modular voting architecture in which vote generation is performed separately from vote casting. A Modular Voting Architecture ( Frogs ) by Shuki Bruck (CalTech, bruck@paradise.caltech.edu) David Jefferson (Compaq, jefferson@pa.dec.com) Ronald L. Rivest (MIT, rivest@mit.edu) August 18, 2001 Abstract:

More information

Thoughts On Appropriate Technologies for Voting

Thoughts On Appropriate Technologies for Voting Thoughts On Appropriate Technologies for Voting Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA Princeton CITP E-voting Workshop 2012-11-01 Is Voting Keeping Up with Technology? We live in

More information

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? AVANTE INTERNATIONAL TECHNOLOGY, INC. (www.vote-trakker.com) 70 Washington Road, Princeton Junction, NJ

More information

Sincerely, Rebecca Mercuri, Ph.D. 116 Grayson Ave. Mercerville, NJ /

Sincerely, Rebecca Mercuri, Ph.D. 116 Grayson Ave. Mercerville, NJ / To: Donna Kelly From: Rebecca Mercuri, Ph.D. Subject: NJ Criteria for VVPR for DREs AG s April 2, 2007 Draft Cc: Irene Goldman Date: May 9, 2007 Dear Ms.

More information

The name or number of the polling location; The number of ballots provided to or printed on-demand at the polling location;

The name or number of the polling location; The number of ballots provided to or printed on-demand at the polling location; Rule 10. Canvassing and Recount 10.1 Precanvass accounting 10.1.1 Detailed Ballot Log. The designated election official must keep a detailed ballot log that accounts for every ballot issued and received

More information

Ad Hoc Voting on Mobile Devices

Ad Hoc Voting on Mobile Devices Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013

More information

Survey of Fully Verifiable Voting Cryptoschemes

Survey of Fully Verifiable Voting Cryptoschemes Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project

More information

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments GAO United States Government Accountability Office Report to the Chairman, Committee on Rules and Administration, U.S. Senate September 2008 ELECTIONS States, Territories, and the District Are Taking a

More information

Pretty Good Democracy for more expressive voting schemes

Pretty Good Democracy for more expressive voting schemes Pretty Good Democracy for more expressive voting schemes James Heather 1, Peter Y A Ryan 2, and Vanessa Teague 3 1 Department of Computing, University of Surrey, Guildford, Surrey GU2 7XH, UK j.heather@surrey.ac.uk

More information

Colorado Secretary of State Election Rules [8 CCR ]

Colorado Secretary of State Election Rules [8 CCR ] Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.

More information

Electronic Voting Machine Information Sheet

Electronic Voting Machine Information Sheet Name / Model: eslate 3000 1 Vendor: Hart InterCivic, Inc. Voter-Verifiable Paper Trail Capability: Yes Brief Description: Hart InterCivic's eslate is a multilingual voter-activated electronic voting system

More information

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JANUARY, 0 Sponsored by: Senator NIA H. GILL District (Essex and Passaic) Senator SHIRLEY K. TURNER District (Hunterdon and Mercer) SYNOPSIS Requires

More information

Towards a Practical, Secure, and Very Large Scale Online Election

Towards a Practical, Secure, and Very Large Scale Online Election Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,

More information

Requiring Software Independence in VVSG 2007: STS Recommendations for the TGDC

Requiring Software Independence in VVSG 2007: STS Recommendations for the TGDC Requiring Software Independence in VVSG 2007: STS Recommendations for the TGDC William Burr, John Kelsey, Rene Peralta, John Wack National Institute of Standards and Technology November 2006 Acronyms and

More information

VOTERGA SAFE COMMISSION RECOMMENDATIONS

VOTERGA SAFE COMMISSION RECOMMENDATIONS VOTERGA SAFE COMMISSION RECOMMENDATIONS Recommended Objectives, Proposed Requirements, Legislative Suggestions with Legislative Appendices This document provides minimal objectives, requirements and legislative

More information

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013 Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London

More information

EXHIBIT C NOTICE OF REFERENDUM OREGON SCHOOL DISTRICT NOVEMBER 6, 2018

EXHIBIT C NOTICE OF REFERENDUM OREGON SCHOOL DISTRICT NOVEMBER 6, 2018 EXHIBIT C NOTICE OF REFERENDUM OREGON SCHOOL DISTRICT NOVEMBER 6, 2018 NOTICE IS HEREBY GIVEN, that at an election to be held in the Oregon School District on November 6, 2018, the following proposed Initial

More information

2016 Election Judges Manual. Casting Ballots. At the Scanning Unit Inserting a Ballot into the Ballot Scanner

2016 Election Judges Manual. Casting Ballots. At the Scanning Unit Inserting a Ballot into the Ballot Scanner 2016 Election Judges Manual Revised 11/11/15 Chapter 15 Casting Ballots At the Scanning Unit... 15.2 Inserting a Ballot into the Ballot Scanner... 15.2 Overvoted Contests... 15.4 Undervoted Contests...

More information

Some Consequences of Paper Fingerprinting for Elections

Some Consequences of Paper Fingerprinting for Elections Some Consequences of Paper Fingerprinting for Elections Joseph A. Calandrino *, William Clarkson *, and Edward W. Felten *, * Center for Information Technology Policy and Dept. of Computer Science, Princeton

More information

Additional Case study UK electoral system

Additional Case study UK electoral system Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament

More information