Cryptographic Voting Protocols: Taking Elections out of the Black Box

Similar documents
The usage of electronic voting is spreading because of the potential benefits of anonymity,

evoting after Nedap and Digital Pen

Voting Protocol. Bekir Arslan November 15, 2008

An untraceable, universally verifiable voting scheme

An Overview on Cryptographic Voting Systems

Swiss E-Voting Workshop 2010

Protocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit

Addressing the Challenges of e-voting Through Crypto Design

CHAPTER 2 LITERATURE REVIEW

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia

A paramount concern in elections is how to regularly ensure that the vote count is accurate.

Accessible Voter-Verifiability

Punchscan: Introduction and System Definition of a High-Integrity Election System

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

L9. Electronic Voting

A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

Receipt-Free Universally-Verifiable Voting With Everlasting Privacy

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV

RECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY

Security of Voting Systems

DIRECTIVE November 20, All County Boards of Elections Directors, Deputy Directors, and Board Members. Post-Election Audits SUMMARY

The E-voting Controversy: What are the Risks?

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

Democracy depends on losers accepting the results

Auditability and Verifiability of Elec4ons Ronald L. Rivest

Josh Benaloh. Senior Cryptographer Microsoft Research

A Verifiable Voting Protocol based on Farnel

Electronic Voting Machine Information Sheet

On the Independent Verification of a Punchscan Election

Paper-based electronic voting

Towards Trustworthy e-voting using Paper Receipts

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

Arthur M. Keller, Ph.D. David Mertz, Ph.D.

Ballot Reconciliation Procedure Guide

Instructions for Closing the Polls and Reconciliation of Paper Ballots for Tabulation (Relevant Statutes Attached)

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

Prêt à Voter: a Systems Perspective

Split-Ballot Voting: Everlasting Privacy With Distributed Trust

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013

COMPUTING SCIENCE. University of Newcastle upon Tyne. Pret a Voter with a Human-Readable, Paper Audit Trail. P. Y. A. Ryan. TECHNICAL REPORT SERIES

VOTERGA SAFE COMMISSION RECOMMENDATIONS

PROCEDURES FOR USE OF VOTE TABULATORS. Municipal Elections Township of Norwich

Risk-limiting Audits in Colorado

Survey of Fully Verifiable Voting Cryptoschemes

Privacy of E-Voting (Internet Voting) Erman Ayday

Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1

Direct Recording Electronic Voting Machines

An Introduction to Cryptographic Voting Systems

H 8072 S T A T E O F R H O D E I S L A N D

Prêt à Voter with Confirmation Codes

L14. Electronic Voting

SEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Security Analysis on an Elementary E-Voting System

Key Considerations for Implementing Bodies and Oversight Actors

Johns Hopkins University Security Privacy Applied Research Lab

Machine-Assisted Election Auditing

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

The name or number of the polling location; The number of ballots provided to or printed on-demand at the polling location;

A Secure Paper-Based Electronic Voting With No Encryption

Good morning. I am Don Norris, Professor of Public Policy and Director of the

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER

The Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

PRIVACY in electronic voting

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.

Report and Analysis of the 2006 Post-Election Audit of Minnesota s Voting Systems

A Robust Electronic Voting Scheme Against Side Channel Attack

PRIVACY PRESERVING IN ELECTRONIC VOTING

Using Prêt à Voter in Victorian State Elections. EVT August 2012

Risk-Limiting Audits

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

ELECTION MANUAL FOR REGIONAL CONVENTIONS

Ranked Voting and Election Integrity

Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett

ARKANSAS SECRETARY OF STATE. Rules on Vote Centers

Blind Signatures in Electronic Voting Systems

ARKANSAS SECRETARY OF STATE

Individual Verifiability in Electronic Voting

AUDIT & RETABULATION OF BALLOTS IN PRECINCTS WHERE A DISCREPANCY EXISTS

AFFIDAVIT OF POORVI L. VORA. 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George

Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?

This page intentionally left blank

Electronic Voting A Strategy for Managing the Voting Process Appendix

Outline. Elections as a challenge problem. History of (US) election mechanisms. Secrecy, vote buying and coercion. Election integrity

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting

Pretty Good Democracy for more expressive voting schemes

Any person who is disorderly or who, in the judgment of the Board, unreasonably disrupts the 5% test may be removed.

Towards Secure Quadratic Voting

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments

Pennsylvania Needs Resilient, Evidence-Based Elections

Secure Electronic Voting

Human readable paper verification of Prêt à Voter

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots

Feng Hao and Peter Y A Ryan (Eds.) Real-World Electronic Voting: Design, Analysis and Deployment

User Guide for the electronic voting system

Ad Hoc Voting on Mobile Devices

Transcription:

Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22

Problems with the current system Necessity of vote reform: 2000 Bush/Gore Presidential race, 2008 Coleman/Franken Minnesota US Senate race, 2009 Ahmadinejad/Mousavi Iran Presidential Elections. In each instance, the controversy erodes voter confidence and ultimately undermines the democratic system. Phong Le Cryptographic Voting 2/22

Public Voting Public Voting In public voting each voter announces their vote. Advantages- A voter can easily verify that their vote is recorded correctly. The entire voting process is transparent. Disadvantages- Vote selling. Voter coercion. Phong Le Cryptographic Voting 3/22

Paper Ballots Paper Ballots Each voter fills out a paper ballot which is collected in a central location. Voting is anonymous. Voting leaves a paper trial for recounting and verification purposes. Advantages- Disadvantages- Ballots can suffer from mechanical errors such as hanging chads. Ballots can be falsified, lost or unreadable. A trusted third party is required to count the votes. Phong Le Cryptographic Voting 4/22

Direct Record Electronic System (DRE) DRE Voters indicate their choices on a computer screen, which then records and tabulates their votes. Fast. Leaves a paper trail for recounts. No mechanical errors. Advantages- Disadvantages- Hackable. Possible manipulation by the DRE manufacturer or voting officials. In this case, the trusted third party is the DRE. Phong Le Cryptographic Voting 5/22

Applying Cryptology Ideally we would like a voter to verify that the vote is cast appropriately and that the vote is accurately counted. In 2004 David Chaum proposed a method to accomplish this using cryptography. In his work, and the many protocols that followed, three concepts from cryptology are used: public key cryptology, zero-knowledge protocols, mix nets. Phong Le Cryptographic Voting 6/22

Public Key Cryptology Key features of public key cryptology: The encryption algorithm, known as the public key, is publicly available. The decryption algorithm, known as the private key, is computationally difficult to determine from the encryption algorithm. The private key is held only by the receiver. Question How might one use public key cryptography to make voting more secure? Phong Le Cryptographic Voting 7/22

Zero-Knowledge Protocols Peggy (in purple) claims she has uncovered a secret word to open a magic door in a cave. Vern (in green) says he will pay for the secret word but not until he s sure that she really knows it. Peggy needs to prove to Vern that she knows the secret word, without revealing what that word is. Phong Le Cryptographic Voting 8/22

Mix Nets A chain of public keys (encryptions) are applied in layers to several messages sent by several different people. Phong Le Cryptographic Voting 9/22

Cryptology in Voting Public key cryptology may be used to construct mix nets and possibly to encipher the candidate choice. Zero-knowledge protocols may be used to provide strong evidence that a tally of votes was made correctly. Mix nets may be used to make ballots untraceable. Question How can we combine these ideas to create a voting protocol? Phong Le Cryptographic Voting 10/22

A Sample Protocol: Scantegrity II First lets examine the voter experience: #0001 Alice Bob Carl This is a blank ballot. The portion at the bottom is the receipt. #0001 Phong Le Cryptographic Voting 11/22

A Completed Ballot #0001 WT9 WT9 Alice Bob Carl #0001 Using a special pen, the voter marks their selection and reveals a unique confirmation code. The voter can then separate the receipt and write down the confirmation code on the receipt. Phong Le Cryptographic Voting 12/22

Top Portion WT9 #0001 Alice Bob Carl The top of the ballot is run through an optical scanner and a tally is made. The ballot ID and the confirmation code are also recorded. Phong Le Cryptographic Voting 13/22

The Receipt and Verification WT9 #0001 The voter can use their receipt to check online whether the confirmation code was recorded correctly. Note that the voter can only verify that the vote was recorded correctly, not reveal what choice was made. Phong Le Cryptographic Voting 14/22

Ballot Audit #0001 KWK Alice H7T Bob VOID WJL Carl #0012 KWK H7T WJL A voter may also audit an additional ballot for integrity. The additional ballot is marked void and all the confirmation codes are revealed. This helps ensure that the ballots are created correctly. These ballots are also scanned and can be checked online. Phong Le Cryptographic Voting 15/22

Ballot Creation Voting officials first generate a ballot table. Randomly generated unique confirmation codes are created and associated to each ballot and candidate. Ballot Key Ballot ID Alice Bob Carl 0001 WT9 7LH JNC 0002 KMT TC3 J3K 0003 CH7 3TW 9JH 0004 WJL KWK H7T 0005 M39 LTM HNN Phong Le Cryptographic Voting 16/22

Ballot Shuffling The confirmation codes of each row are permuted. This is our first mix in our mix net. Ballot Key Ballot ID Alice Bob Carl 0001 WT9 7LH JNC 0002 KMT TC3 J3K 0003 CH7 3TW 9JH 0004 WJL KWK H7T 0005 M39 LTM HNN Table Q Ballot ID 0001 7LH WT9 JNC 0002 J3K TC3 KMT 0003 9JH CH7 3TW 0004 KWK H7T WJL 0005 M39 HNN LTM After mixing the columns do not correspond to the different candidates anymore. Phong Le Cryptographic Voting 17/22

The Commitments Another table is created that permutes the ballot IDs and reveals which confirmation code is assigned to which candidate. This is called the table of commitments. It is our second mix. Table Q Ballot ID 0001 7LH WT9 JNC 0002 J3K TC3 KMT 0003 9JH CH7 3TW 0004 KWK H7T WJL 0005 M39 HNN LTM + Commitment Table Flag Q-Pointer S-Pointer (0005, 1) (2, 1) (0003, 3) (4, 2) (0002, 1) (4, 3) (0001, 3) (3, 3) (0001, 2) (4, 1) (0005, 3) (3, 2) (0004, 2) (5, 3) (0003, 1) (2, 3) (0004, 3) (3, 1) (0002, 3) (1, 1) (0001, 1) (2, 2) (0002, 2) (5, 2) (0004, 1) (1, 2) (0003, 2) (5, 1) (0005, 2) (1, 3) = Table S: Tally Alice Bob Carl KMT KWK HNN M39 7LH 9JH WJL LTM JNC WT9 3TW J3K CH7 TC3 H7T Phong Le Cryptographic Voting 18/22

Private Information Ballot Key Ballot ID Alice Bob Carl 0001 WT9 7LH JNC 0002 KMT TC3 J3K 0003 CH7 3TW 9JH 0004 WJL KWK H7T 0005 M39 LTM HNN Commitments Flag Q-Pointer S-Pointer (0005, 1) (2, 1) (0003, 3) (4, 2) (0002, 1) (4, 3) (0001, 3) (3, 3) (0001, 2) (4, 1) (0005, 3) (3, 2) (0004, 2) (5, 3) (0003, 1) (2, 3) (0004, 3) (3, 1) (0002, 3) (1, 1) (0001, 1) (2, 2) (0002, 2) (5, 2) (0004, 1) (1, 2) (0003, 2) (5, 1) (0005, 2) (1, 3) Table Q Ballot ID 0001 7LH WT9 JNC 0002 J3K TC3 KMT 0003 9JH CH7 3TW 0004 KWK H7T WJL 0005 M39 HNN LTM Table S: Tally Alice Bob Carl KMT KWK HNN M39 7LH 9JH WJL LTM JNC WT9 3TW J3K CH7 TC3 H7T Phong Le Cryptographic Voting 19/22

Post-election Recount First the ballot box is opened up and the confirmation codes are filled in. Audited ballots are also entered. Commitments Flag Q-Pointer S-Pointer Ballot ID 0001 0002 0003 0004 0005 Table Q Table S: Tally Alice Bob Carl Phong Le Cryptographic Voting 20/22

Post-election Recount First the ballot box is opened up and the confirmation codes are filled in. Audited ballots are also entered. Commitments Flag Q-Pointer S-Pointer Table Q Ballot ID 0001 WT9 0002 J3K 0003 CH7 0004 KWK H7T WJL 0005 LTM Table S: Tally Alice Bob Carl Phong Le Cryptographic Voting 20/22

Post-election Recount The ballot officials also flag the corresponding entries in the tally table based on the hidden table of commitments. Commitments Flag Q-Pointer S-Pointer Table Q Ballot ID 0001 WT9 0002 J3K 0003 CH7 0004 KWK H7T WJL 0005 LTM Table S: Tally Alice Bob Carl Phong Le Cryptographic Voting 20/22

Post-election Recount At this point the hidden table of commitments prevents the public from tallying the votes correctly. It also prevents the public from tracing a ballot. Commitments Flag Q-Pointer S-Pointer Table Q Ballot ID 0001 WT9 0002 J3K 0003 CH7 0004 KWK H7T WJL 0005 LTM Table S: Tally Alice Bob Carl Phong Le Cryptographic Voting 20/22

Post-election Recount Next the flags in the table of commitments are raised corresponding to the associated commitments. Also, either the Q-pointer or the S-pointer of each row is randomly chosen to be revealed. Table Q Ballot ID 0001 WT9 0002 J3K 0003 CH7 0004 KWK H7T WJL 0005 LTM Commitments Flag Q-Pointer S-Pointer (2, 1) (0003, 3) (4, 3) (3, 3) (0001, 2) (0005, 3) (0004, 2) (5, 3) (2, 3) (0004, 3) (3, 1) (0002, 3) (0001, 1) (0002, 2) (0004, 1) (1, 2) (5, 1) (0005, 2) Table S: Tally Alice Bob Carl Phong Le Cryptographic Voting 20/22

Post-election Recount If one entry in the table of commitments was modified, there would be a 50% that it would be revealed. Table Q Ballot ID 0001 WT9 0002 J3K 0003 CH7 0004 KWK H7T WJL 0005 LTM Commitments Flag Q-Pointer S-Pointer (2, 1) (0003, 3) (4, 3) (3, 3) (0001, 2) (0005, 3) (0004, 2) (5, 3) (2, 3) (0004, 3) (3, 1) (0002, 3) (0001, 1) (0002, 2) (0004, 1) (1, 2) (5, 1) (0005, 2) Table S: Tally Alice Bob Carl Phong Le Cryptographic Voting 20/22

Commitments This half-open table of commitments combines part of the mix net and zero-knowledge proof protocols. Flag Q-Pointer S-Pointer (2, 1) (0003, 3) (4, 3) (3, 3) (0001, 2) (0005, 3) (0004, 2) (5, 3) (2, 3) (0004, 3) (3, 1) (0002, 3) (0001, 1) (0002, 2) (0004, 1) (1, 2) (5, 1) (0005, 2) Phong Le Cryptographic Voting 21/22

Go and Vote! Phong Le Cryptographic Voting 22/22