ISI Day – 20th Anniversary

Slides:



Advertisements
Similar presentations
Trusting the Vote Ben Adida - Cryptography and Information Security Group MIT Computer Science and Artificial.
Advertisements

Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Electronic Voting Systems
Talk by Vanessa Teague, University of Melbourne Joint work with Chris Culnane, James Heather & Steve Schneider at University of.
Electronic Voting System Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin Dan S. Wallach IEEE Symp. On Security and Privacy 2004 VoteHere System Analysis,
Electronic Voting Ronald L. Rivest MIT CSAIL Norway June 14, 2004.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
A technical analysis of the VVSG 2007 Stefan Popoveniuc George Washington University The PunchScan Project.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy.
Electronic Voting Presented by Ben Riva Based on presentations and papers of: Schoenmakers, Benaloh, Fiat, Adida, Reynolds, Ryan and Chaum.
Josh Benaloh Senior Cryptographer Microsoft Research.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
Kickoff Meeting „E-Voting Seminar“
Trustworthy Elections without Paper Ballots Why vote receipts deserve consideration May 26, 2004 C. Andrew Neff, Ph.D. Chief Scientist VoteHere, Inc.
August 6, 2007Electronic Voting Technology 2007 On Estimating the Size and Confidence of a Statistical Audit Javed A. Aslam College of Computer and Information.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Voting System Qualification How it happens and why.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Security of Voting Systems Ronald L. Rivest MIT CSAIL Given at: GWU Computer Science Dept. November 9, 2009.
Perspectives on “End-to-End” Voting Systems Ronald L. Rivest MIT CSAIL NIST E2E Workshop George Washington University October 13, 2009 Ballot Bob Ballot.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Cryptographic Voting Systems (Ben Adida) Jimin Park Carleton University COMP 4109 Seminar 15 February 2011.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
Digital Democracy: A look at Voting Machines Presented by Justin Dugger April 2003.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
A. Steffen, , Kickoff.pptx 1 Kickoff Meeting „E-Voting Seminar“ An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für.
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
The Paillier Cryptosystem
“The right of citizens of the United States to vote shall not be denied or abridged by the United States or by any state on account of [race, color, or.
WHY THE vvpat has failed
WHAT CONSTITUTES A VOTE? Annual Training for County Election Officials
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
VVPAT Building Confidence in U.S. Elections. WHAT IS VVPAT ? Voter-verifiable paper audit trail Requires the voting system to print a paper ballot containing.
Auditability and Verifiability of Elections Ronald L. Rivest MIT ACM-IEEE talk March 16, 2016.
Secure, verifiable online voting 29 th June 2016.
Ronald L. Rivest MIT NASEM Future of Voting Meeting June 12, 2017
Security of Voting Systems
Perspectives on “End-to-End” Voting Systems
ThreeBallot, VAV, and Twin
E-voting …and why it’s good..
Audit Thoughts Ronald L. Rivest MIT CSAIL Audit Working Meeting
ELECTRONIC VOTING SYSTEMS André Martins Hugo António Miguel Cordeiro
Ronald L. Rivest MIT NASEM Future of Voting December 7, 2017
Improving Reliability of Direct Recording Electronic Voting Systems
Texas Secretary of State Elections Division
Texas Secretary of State Elections Division
Election Security Best Practices
Practical Aspects of Modern Cryptography
Texas Secretary of State Elections Division
Auditability and Verifiability of Elections
Some Thoughts on Electronic Voting
eVoting System Proposal
Texas Secretary of State Elections Division
Some Thoughts on Electronic Voting
Election Security Best Practices
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Some Thoughts on Electronic Voting
Chapter 7: The Electoral Process Section 2
Ronald L. Rivest MIT ShafiFest January 13, 2019
Presentation transcript:

ISI Day – 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch

Where the heck is Rapperswil?

HSR - Hochschule für Technik Rapperswil University of Applied Sciences with about 1000 students Faculty of Information Technology (300-400 students) Bachelor Course (3 years), Master Course (+1.5 years)

Cryptographic Voting Systems Summary of my talk: Due to repeated failures and detected vulnerabilities in both electro-mechanical and electronic voting machines, voters have somehow lost faith that the outcome of a poll always represents the true will of the electorate. Manual counting of paper ballots is not really an option in the 21st century and is not free from tampering either. Modern cryptographic voting systems allow true end-to-end verification of the complete voting process by any individual voter, without sacrificing secrecy and privacy.

Direct Recording Electronic Voting Machines In the 2006 mid-term federal elections, one third of registered U.S. voters used Direct Recording Electronic (DRE) voting machines. In the 2008 federal elections, many states returned to paper ballots with optical scanning but six states used 100% DREs without a Voter-Verified Paper Audit Trail (VVPAT). Diebold Elections System DRE voting machine with a VVPAT attachment.

Losing Trust in Electronic Voting Systems 2006 - The Morning Call: Voter smashes DRE in Allentown with metal cat 2006 - Princeton study on Diebold DRE: Hack the vote? No problem 2006 - Dutch ES3B voting machines: Hacked to play chess

Traditional Chain-of-Custody Security Software Verification Sealing Tallying Verification by proxy only Source: Ben Adida, Ph.D. Thesis 2006

Desirable: End-to-End Verification by Voter Secrecy? Privacy? Source: Ben Adida, Ph.D. Thesis 2006

End-to-End Auditable Voting System (E2E) Any voter can verify that his or her ballot is included unmodified in a collection of ballots. Any voter (and typically any independent party additionally) can verify, with high probability, that the collection of ballots produces the correct final tally. No voter can demonstrate how he or she voted to any third party (thus preventing vote-selling and coercion). Source: Wikipedia

Solution: Cryptographic Voting Systems Source: Ben Adida, Ph.D. Thesis 2006

Proposed E2E Systems Punchscan by David Chaum. Prêt à Voter by Peter Ryan. Scratch & Vote by Ben Adida and Ron Rivest. ThreeBallot by Ron Rivest (paper-based without cryptography) Scantegrity II by David Chaum, Ron Rivest, Peter Ryan et al. (add-on to optical scan voting systems using Invisible Ink)

Scratch & Vote Ballot Perforation Encryptpk(256, r1) Obama Randomized candidate list None McCain 2D barcode ElGamal or Paillier Public Key Encryption r1 r2 r3 Random Key Scratch surface Source: Ben Adida, Ph.D. Thesis 2006

Homomorphic Counters 256 00...01 00...00 00...00 One vote for Obama 228 00...00 00...01 00...00 One vote for McCain 20 00...00 00...00 00...01 One vote for None Obama McCain None 00...10 00...01 00...00 Tallying Counter Multiplication of all encrypted votes with Tallying Counter accumulates votes in the candidates‘ counters in encrypted form. Total number of registered U.S. voters < 228 (28 bits) 1024 bit Paillier Public Key Cryptosystem could handle 35 candidates Source: Ben Adida, Ph.D. Thesis 2006

Pre-Voting Verification I McCain None Obama Obama None McCain Vote Audit Valerie the Voter Source: Ben Adida, Ph.D. Thesis 2006

Pre-Voting Verification II None McCain Obama McCain None Obama Obama None McCain Vote Audit r1 r2 r3 Valerie the Voter Source: Ben Adida, Ph.D. Thesis 2006

 Casting the Ballot I McCain Obama None Valerie the Voter Source: Ben Adida, Ph.D. Thesis 2006

 Casting the Ballot II McCain Obama Ed the None Election Official Valerie the Voter Source: Ben Adida, Ph.D. Thesis 2006

 Casting the Ballot III Optical Scanner Ed the Election Official Keep as a receipt Valerie the Voter Source: Ben Adida, Ph.D. Thesis 2006

Post-Voting Verification Web Bulletin Board Valerie Vanessa Victor     Valerie the Voter Source: Ben Adida, Ph.D. Thesis 2006

Tally and Decryption of Final Result Web Bulletin Board 00...10 00...01 00...00 Obama McCain None Democrats Threshold decryption with shared private key Republicans Independents Valerie Vanessa Victor    0101101...11100100011 Homomorphic Addition Encrypted tallying counter Source: Ben Adida, Ph.D. Thesis 2006

Conclusion Modern Cryptographic Voting Systems allow true end-to-end verification of the whole voting process by anyone while maintaining a very high level of secrecy. Due to the advanced mathematical principles they are based on, Cryptographic Voting Systems are not easy to understand and are therefore not readily accepted by authorities and the electorate. But let‘s give Cryptographic Voting Systems a chance! They can give democracy a new meaning in the 21st century!