An Overview on Cryptographic Voting Systems

Similar documents
An Introduction to Cryptographic Voting Systems

Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

Security of Voting Systems

Accessible Voter-Verifiability

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Auditability and Verifiability of Elec4ons Ronald L. Rivest

Arthur M. Keller, Ph.D. David Mertz, Ph.D.

Thoughts On Appropriate Technologies for Voting

Josh Benaloh. Senior Cryptographer Microsoft Research

Cryptographic Voting Protocols: Taking Elections out of the Black Box

COMPUTING SCIENCE. University of Newcastle upon Tyne. Pret a Voter with a Human-Readable, Paper Audit Trail. P. Y. A. Ryan. TECHNICAL REPORT SERIES

Human readable paper verification of Prêt à Voter

Feng Hao and Peter Y A Ryan (Eds.) Real-World Electronic Voting: Design, Analysis and Deployment

evoting after Nedap and Digital Pen

Swiss E-Voting Workshop 2010

A Verifiable Voting Protocol based on Farnel

Risk-Limiting Audits

CHAPTER 2 LITERATURE REVIEW

The usage of electronic voting is spreading because of the potential benefits of anonymity,

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

Addressing the Challenges of e-voting Through Crypto Design

Punchscan: Introduction and System Definition of a High-Integrity Election System

Voting Protocol. Bekir Arslan November 15, 2008

A Secure Paper-Based Electronic Voting With No Encryption

AFFIDAVIT OF POORVI L. VORA. 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George

DIRECTIVE November 20, All County Boards of Elections Directors, Deputy Directors, and Board Members. Post-Election Audits SUMMARY

The Effectiveness of Receipt-Based Attacks on ThreeBallot

Towards Trustworthy e-voting using Paper Receipts

L9. Electronic Voting

Brittle and Resilient Verifiable Voting Systems

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013

Risk-limiting Audits in Colorado

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER

Privacy of E-Voting (Internet Voting) Erman Ayday

Ronald L. Rivest MIT CSAIL Warren D. Smith - CRV

Split-Ballot Voting: Everlasting Privacy With Distributed Trust

TECHNICAL REPORT SERIES. No. CS-TR-1071 February, Human readable paper verification of Pret a Voter. David Lundin and Peter Y. A. Ryan.

vvote: a Verifiable Voting System

Some Consequences of Paper Fingerprinting for Elections

Prêt à Voter with Confirmation Codes

Security Analysis on an Elementary E-Voting System

Electronic Voting. Mohammed Awad. Ernst L. Leiss

Using Prêt à Voter in Victorian State Elections. EVT August 2012

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

A vvote: a Verifiable Voting System

Colorado Secretary of State Election Rules [8 CCR ]

Towards a Standard Architecture for Digital Voting Systems - Defining a Generalized Ballot Schema

2010 Pre-election Logic and Accuracy & Post-election Audit Grant Program

Secure Electronic Voting

Instructions for Closing the Polls and Reconciliation of Paper Ballots for Tabulation (Relevant Statutes Attached)

Machine-Assisted Election Auditing

The E-voting Controversy: What are the Risks?

Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting

Introduction of Electronic Voting In Namibia

The name or number of the polling location; The number of ballots provided to or printed on-demand at the polling location;

Ad Hoc Voting on Mobile Devices

Formal Verification of Selene with the Tamarin prover

Prêt à Voter: a Systems Perspective

Global Conditions (applies to all components):

PRIVACY in electronic voting

Mitigating Coercion, Maximizing Confidence in Postal Elections

Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF

1S Recount Procedures. (1) Definitions. As used in this rule, the term: (a) Ballot text image means an electronic text record of the content of

Distributed Protocols at the Rescue for Trustworthy Online Voting

(1) PURPOSE. To establish minimum security standards for voting systems pursuant to Section (4), F.S.

L14. Electronic Voting

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy

Direct Recording Electronic Voting Machines

Paper-based electronic voting

Requiring Software Independence in VVSG 2007: STS Recommendations for the TGDC

HOUSE BILL 1060 A BILL ENTITLED. Election Law Delay in Replacement of Voting Systems

Towards Secure Quadratic Voting

ThreeBallot in the Field

Elections, Technology, and the Pursuit of Integrity: the Connecticut Landscape

On the Independent Verification of a Punchscan Election

Michigan Election Reform Alliance P.O. Box Ypsilanti, MI

STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

Johns Hopkins University Security Privacy Applied Research Lab

福井大学審査 学位論文 博士 ( 工学 )

Outline. Elections as a challenge problem. History of (US) election mechanisms. Secrecy, vote buying and coercion. Election integrity

SPECIAL VOTE BY MAIL PROCEDURES. City of London 2018 Municipal Election

Good morning. I am Don Norris, Professor of Public Policy and Director of the

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

Cuyahoga County Board of Elections

On e-voting and privacy

Pennsylvania Needs Resilient, Evidence-Based Elections

Privacy Issues in an Electronic Voting Machine

Automating Voting Terminal Event Log Analysis

OSCE Parliamentary Assembly Post-Election Statement U.S. General Elections 6 November 2008

An untraceable, universally verifiable voting scheme

Risk-Limiting Audits for Denmark and Mongolia

Individual Verifiability in Electronic Voting

Ballot Reconciliation Procedure Guide

An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 1

Transcription:

ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1

Where the heck is Rapperswil? A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 2

HSR - Hochschule für Technik Rapperswil University of Applied Sciences with about 1000 students Faculty of Information Technology (300-400 students) Bachelor Course (3 years), Master Course (+1.5 years) A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 3

Cryptographic Voting Systems Summary of my talk: Due to repeated failures and detected vulnerabilities in both electro-mechanical and electronic voting machines, voters have somehow lost faith that the outcome of a poll always represents the true will of the electorate. Manual counting of paper ballots is not really an option in the 21 st century and is not free from tampering either. Modern cryptographic voting systems allow true end-to-end verification of the complete voting process by any individual voter, without sacrificing secrecy and privacy. A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 4

Direct Recording Electronic Voting Machines In the 2006 mid-term federal elections, one third of registered U.S. voters used Direct Recording Electronic (DRE) voting machines. In the 2008 federal elections, many states returned to paper ballots with optical scanning but six states used 100% DREs without a Voter-Verified Paper Audit Trail (VVPAT). Diebold Elections System DRE voting machine with a VVPAT attachment. A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 5

Losing Trust in Electronic Voting Systems 2006 - The Morning Call: Voter smashes DRE in Allentown with metal cat 2006 - Princeton study on Diebold DRE: Hack the vote? No problem 2006 - Dutch ES3B voting machines: Hacked to play chess A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 6

Traditional Chain-of-Custody Security Sealing Software Verification Tallying Verification by proxy only A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 7

Desirable: End-to-End Verification by Voter Secrecy? Privacy? A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 8

End-to-End Auditable Voting System (E2E) Any voter can verify that his or her ballot is included unmodified in a collection of ballots. Any voter (and typically any independent party additionally) can verify, with high probability, that the collection of ballots produces the correct final tally. No voter can demonstrate how he or she voted to any third party (thus preventing vote-selling and coercion). Source: Wikipedia A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 9

Solution: Cryptographic Voting Systems A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 10

Proposed E2E Systems Punchscan by David Chaum. Prêt à Voter by Peter Ryan. Scratch & Vote by Ben Adida and Ron Rivest. ThreeBallot by Ron Rivest (paper-based without cryptography) Scantegrity II by David Chaum, Ron Rivest, Peter Ryan et al. (add-on to optical scan voting systems using Invisible Ink) A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 11

Scratch & Vote Ballot Perforation Randomized candidate list 2D barcode Obama None McCain Encrypt pk (2 56, r1) Encrypt pk (2 0, r2) Encrypt pk (2 28, r3) ElGamal or Paillier Public Key Encryption Scratch surface r1 r2 r3 Random Key A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 12

Homomorphic Counters 2 56 00...01 00...00 00...00 2 28 00...00 00...01 00...00 2 0 00...00 00...00 00...01 Obama McCain None 00...10 00...01 00...00 One vote for Obama One vote for McCain One vote for None Tallying Counter Multiplication of all encrypted votes with Tallying Counter accumulates votes in the candidates counters in encrypted form. Total number of registered U.S. voters < 2 28 (28 bits) 1024 bit Paillier Public Key Cryptosystem could handle 35 candidates A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 13

Pre-Voting Verification I McCain Obama None None Obama McCain Vote Valerie the Voter Audit A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 14

Pre-Voting Verification II McCain Obama None None Obama McCain None Obama McCain r1 r2 r3 Vote Valerie the Voter Audit A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 15

Casting the Ballot I McCain Obama None Valerie the Voter A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 16

Casting the Ballot II McCain Obama None Ed the Election Official Valerie the Voter A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 17

Casting the Ballot III Keep as a receipt Optical Scanner Ed the Election Official Valerie the Voter A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 18

Post-Voting Verification Web Bulletin Board Valerie Vanessa Victor Valerie the Voter A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 19

Tally and Decryption of Final Result Obama McCain None 00...10 00...01 00...00 Threshold decryption with shared private key Valerie Web Bulletin Board Vanessa Victor Democrats Republicans Independents Homomorphic Addition 0101101...11100100011 Encrypted tallying counter A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 20

Conclusion Modern Cryptographic Voting Systems allow true end-to-end verification of the whole voting process by anyone while maintaining a very high level of secrecy. Due to the advanced mathematical principles they are based on, Cryptographic Voting Systems are not easy to understand and are therefore not readily accepted by authorities and the electorate. But let s give Cryptographic Voting Systems a chance! They can give democracy a new meaning in the 21 st century! A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 21