Electronic voting: theory and practice Mark D. Ryan ● Electronic voting promises – convenient way of recording and tallying votes – security against fraud.

Slides:



Advertisements
Similar presentations
Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Advertisements

Electronic Voting Systems
Talk by Vanessa Teague, University of Melbourne Joint work with Chris Culnane, James Heather & Steve Schneider at University of.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Civitas Verifiability and Coercion Resistance for Remote Voting University of South Alabama August 15, 2012 Michael Clarkson The George Washington University.
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Civitas Security and Transparency for Remote Voting Swiss E-Voting Workshop September 6, 2010 Michael Clarkson Cornell University with Stephen Chong (Harvard)
A Pairing-Based Blind Signature
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
A technical analysis of the VVSG 2007 Stefan Popoveniuc George Washington University The PunchScan Project.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran Joint work with Moni Naor.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Research & development A Practical and Coercion-resistant scheme for Internet Voting Jacques Traoré (joint work with Roberto Araújo and Sébastien Foulle)
Ronald L. Rivest MIT Laboratory for Computer Science
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
Kickoff Meeting „E-Voting Seminar“
Trustworthy Elections without Paper Ballots Why vote receipts deserve consideration May 26, 2004 C. Andrew Neff, Ph.D. Chief Scientist VoteHere, Inc.
Receipt-freeness and coercion-resistance: formal definitions and fault attacks Stéphanie Delaune / Steve Kremer / Mark D. Ryan.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Voting and Elections.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Static Validation of a Voting ProtocolSlide 1 Static Validation of a Voting Protocol Christoffer Rosenkilde Nielsen with Esben Heltoft Andersen and Hanne.
Author: Michał Rajkowski Tutor: prof. dr hab. inż. Zbigniew Kotulski.
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Requirements for Electronic and Internet Voting Systems in Public Elections David Jefferson Compaq Systems Research Center Palo Alto, CA
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY Sakurai Lab. Kyushu University Dr-course HER, Yong-Sork E-voting VS. E-auction.
Chapter 7: The Electoral Process Section 2
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Cryptographic Voting Systems (Ben Adida) Jimin Park Carleton University COMP 4109 Seminar 15 February 2011.
E-Voting Dissent Sara Wilson, Katie Noto, John Massie, Will Sutherland, Molly Cooper.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
ISFED/GORBI Study of Citizen Attitudes and Knowledge on Election Issues Funded by The National Endowment for Democracy (NED) Technical Assistance Provided.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
Online voting: a legal perspective
Focus Groups Experiences with Prêt à Voter Steve Schneider, University of Surrey 3 September 2010 TexPoint fonts used in EMF. Read the TexPoint manual.
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
E-voting Bringing the voting process to the technology age.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Lesson 3: The Voting Process. Elections Newfoundland and Labrador Elections Newfoundland and Labrador is a non- partisan office of the House of Assembly.
E-Government, E-Voting, and the Future Jordan Weiler.
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
Secure, verifiable online voting 29 th June 2016.
Recipt-free Voting Through Distributed Blinding
ThreeBallot, VAV, and Twin
Ronald L. Rivest MIT NASEM Future of Voting December 7, 2017
ISI Day – 20th Anniversary
eVoting System Proposal
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
The Italian Academic Community’s Electronic Voting System
Chapter 7: The Electoral Process Section 2
Presentation transcript:

Electronic voting: theory and practice Mark D. Ryan ● Electronic voting promises – convenient way of recording and tallying votes – security against fraud and manipulation – transparency for voters and candidates ● It could be used in a variety of kinds of elections – small committees or on-line communities – student elections, trade unions, local government – full national elections

● Governments worldwide are investing in e-voting ● Electronic systems potentially allow large scale undetectable fraud – In contrast, fraud in manual systems limited by requirement to generate or dispose of paper, which is quite hard to do undetectably in presence of TV cameras. ● There are protocols which are capable of guaranteeing strong properties – But few companies are marketing them, and few countries are interested in them for their government elections Electronic voting -- context

Some desired properties of e-voting systems – 1. Accuracy: the declared outcome corresponds properly to the votes cast. – 2. Eligibility: only eligible voters can vote, and only once. – 3. Fairness: no early results; i.e. no voter can be influenced by votes already made. Question: which of these properties does the current UK system provide? Remark: difference between “assurance” and “cryptographic guarantee”

More desired properties ● Transparency – 4. Individual verifiability: a voter can verify that her vote was counted. – 5. Universal verifiability: a voter can verify that the published result is the tally of the votes cast.

● 6. Privacy – no-one can find out how Alice voted. ● 7. Receipt-freeness – Alice doesn’t get a receipt (or any other by-product of the voting process); thus: – Alice cannot prove afterwards to a coercer how she voted – Thus, receipt-freeness is like privacy, but even with Alice’s cooperation ● 8. Coercion-resistance – Alice cannot prove how she voted, even if interaction with the coercer is allowed during the voting process – Even stronger than receipt-freeness. Yet more desired properties

Coercion resistance and the voting booth Voting booth Voting system Published data Coercer

Coercion-resistance ● Alice interacts with the coercer (e.g. by mobile phone) during the election. ● The coercer can participate in Alice’s vote: ● She can tell him messages she receives during the process (although he might not believe her) ● He can instruct her on what messages to send back (although she might not obey). ● He might have independent means of verifying her reports and her actions

Some “non-functional” requirements – 9. Robustness: Voters cannot disrupt the election. Faulty behaviour tolerated. – 10. Vote-and-go: Voters participate just once in an election.

– US Presidential election 2000 and 2004 employed a variety of “direct recording electronic” (DRE) systems, the dominant supplier of which is Diebold. – Proprietary system, not based on disciplined protocol. Numerous allegations of involvement of equipment supplier with a political party. – “I voted party p1 and the system said `Thank you, we have recorded your vote for party p2.’ ” (Radio phone-ins, websites) – None of our list of desired properties can be guaranteed in any meaningful way. The current situation in the USA

● “Black Box Voting” signifies voting which reports a result without allowing proper verification or auditability of the votes and totals. ● Activist Bev Harris popularised the term in her book with that title and runs the BlackBoxVoting.org website. ● Such electronic voting machines can be rigged. If a programmer for a private company which makes such machines writes code which steals votes, it will be difficult to detect. Afterwards, if election results are suspicious, there is no way to do a meaningful recount. Situation in the USA

– Diebold’s code was leaked on the internet. – Academic computer security researchers Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach wrote a damning critique of it, showing lots of naive assumptions and security risks. – “15 year old in garage could manufacture cards and sell them on the internet that would allow multiple votes” [Avi Rubin] Situation in the USA

● Tiny former Soviet republic (pop. 1.4M) nicknamed "e-Stonia" because of its tech-savvy population ● Oct 2005 election allowed voters nationwide to cast ballots over the Internet. ● Fewer than 10,000 people (1% of registered voters) participated online. ● Officials hailed the experiment as a success. Said they had received no reports of flaws or hacking attempts. The system is based on Linux. ● Voters need a special ID card, a $24 device that reads the card, and a computer with Internet access. About 80 percent of Estonian voters have the ID cards, also used since 2002 for online access to bank accounts and tax records. The current situation in Estonia

● Estonian election system allows multiple online votes to be cast by the same person during the days of advance voting, with each subsequent vote cancelling out the previous one. ● The Estonian system still gives priority to paper ballots, so anyone who voted online can also go to a polling station on election day and vote in the traditional way, cancelling out the vote they cast online. Estonia and coercion-resistance "Check out the world’s most high-tech cabinet room. This e-cabinet doesn’t just look cool. It is cool – and it promotes efficiency and saves money, too." Newsweek, March 11, 2002

● "The benefits don't come anywhere near the risks," said Jason Kitcat, an online consultant and researcher at the University of Sussex in England. "It's a waste of money and a waste of government energy." ● He acknowledged that Estonia's system was the most secure to date but said no system was "good enough for a politically binding election." But critics claim no system better than manual voting

● The systems used in the USA and other countries are based on proprietary code – Therefore, it is impossible to investigate the properties of those systems properly ● Some systematic protocols exist – The protocols can be systematically evaluated in terms of whether they satisfy properties. – Systems can be implemented that comply with the protocols. Electronic voting protocols

[FujiokaOkamotoOhta1992] AliceAdministratorCollector I III II

● Blind signatures – To guarantee privacy ● Commitment – To guarantee fairness ● Three phases – To avoid traffic analysis attacks FujiokaOkamotoOhta1992

[FujiokaOkamotoOhta1992] ● Cryptographic guarantees of ● privacy (link between voter and vote kept secret) ● fairness (no early results) even if the election officials are corrupt. ● does not satisfy ● vote-and-go ● coercion resistance

Simplified [LBDKYY’03] ● Uses re-encryption and designated verifier proofs. ● Re-encryption ● Randomised encryption: {m} K contains “random coins” ● Re-encryption: change the random coin ● E.g., in El Gamal, the ciphertext (x,y) is changed to (xg r,yh r ). ● Designated verifier proofs ● S can prove to A that, say, c is the encryption of m, but A cannot use this proof to convince someone else. ● Technically this is achieved by giving A the ability to simulate transcripts of the proof

Simplified [LBDKYY’03] Alice Trusted smartcard Collector

Simplified [LBDKYY’03] ● Cryptographic guarantees of ● privacy (link between voter and vote kept secret) ● fairness (no early results) ● receipt-freeness (like coercion resistance, but assuming passive attacker) even if the election officials are corrupt. ● also satisfies ● vote-and-go ● does not satisfy ● coercion resistance

[Chaum P.Ryan Schneider 2005] AliceT2k-2T2k-4T2T0Administrator

Where will it go from here? ● Stakes very high. Powerful players. American experience gives plenty of cause for concern. Estonian experience significantly better. ● Apparently no real effort at using strong protocols. ● Ron Rivest is leading a standards initiative in the USA. Might not result in anything, but.... ● David Chaum a passionate believer in citizen empowerment, and sells (or used to sell) voting systems through his company Votegrity.