Ben Hosp, Nils Janson, Phillipe Moore, John Rowe, Rahul Simha, Jonathan Stanton, Poorvi Vora {bhosp, simha, jstanton, Dept. of Computer.

Slides:



Advertisements
Similar presentations
Analysis of an Internet Voting Protocol Dale Neal Garrett Smith.
Advertisements

Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Secure Multiparty Computations on Bitcoin
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
David Evans CS588: Cryptography University of Virginia Computer Science Lecture 17: Public-Key Protocols.
Talk by Vanessa Teague, University of Melbourne Joint work with Chris Culnane, James Heather & Steve Schneider at University of.
Electronic Voting Ronald L. Rivest MIT CSAIL Norway June 14, 2004.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
2010 ELECTION TRAINING POLL CLERK. PRECINCT OFFICIALS The precinct team consists of: The precinct team consists of:  Republican  One Inspector  One.
Wombat Voting 1.Designed ( ) 2.Implemented ( ) 3.Deployed (1 x 2011, 2 x 2012)
A Pairing-Based Blind Signature
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
Wombat Voting Alon Rosen IDC Herzliya July 20, 2012.
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran Joint work with Moni Naor.
A method for electronic voting with Coercion-free receipt David J. Reynolds (unaffiliated)
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
© VoteHere, Inc. All rights reserved. November 2004 VHTi Data Demonstration Andrew Berg Director, Engineering.
26 May 2004 DIMACS P Y A Ryan Dependability of the Chaum Scheme 1 Towards a Dependability Case for the Chaum Voting Scheme Peter Y A Ryan University of.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Chapter 10.1 Who Can Vote?.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Bob can sign a message using a digital signature generation algorithm
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Requirements for Electronic and Internet Voting Systems in Public Elections David Jefferson Compaq Systems Research Center Palo Alto, CA
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY Sakurai Lab. Kyushu University Dr-course HER, Yong-Sork E-voting VS. E-auction.
Perspectives on “End-to-End” Voting Systems Ronald L. Rivest MIT CSAIL NIST E2E Workshop George Washington University October 13, 2009 Ballot Bob Ballot.
Chapter 4: Intermediate Protocols
Cryptography, Authentication and Digital Signatures
Secret Ballot Receipts True Voter-Verifiable Elections Richard Carback Kevin Fisher Sandi Lwin CMSC 691v April 3, 2005.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Based on Schneier Chapter 5: Advanced Protocols Dulal C. Kar.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
1 The Promise of Equality in Voting Still Not a Reality for Americans with Disabilities Granite State Independent Living “Tools for Living Life on Your.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
Digital Signatures, Message Digest and Authentication Week-9.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Voting System The PunchScan Rick Carback, David Chaum, Jeremy Clark, Aleks Essex, Kevin Fisher, Ben Hosp, Stefan Popoveniuc, and Jeremy Robin.
Political Process 3.6 Politics and Government. E- voting Electronic voting systems for electorates have been in use since the 1960s when punched card.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
WHY THE vvpat has failed
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
EA Tablet ® Poll Worker Training Setup and Use of the EA Tablet ® Ohio Version – Fourth Edition © 2014 Election Administrators, LLC C ONFIDENTIAL N OTICE.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Perspectives on “End-to-End” Voting Systems
Calhoun County Chief Deputy Clerk of Elections
Recipt-free Voting Through Distributed Blinding
ThreeBallot, VAV, and Twin
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
ISI Day – 20th Anniversary
eVoting System Proposal
Presentation transcript:

Ben Hosp, Nils Janson, Phillipe Moore, John Rowe, Rahul Simha, Jonathan Stanton, Poorvi Vora {bhosp, simha, jstanton, Dept. of Computer Science George Washington University

Integrity during ballot casting: paper receipts Challenge: allow the voter to keep a record of her vote so –she can determine that it has been counted correctly, yet –not prove how she voted This record on paper, so “computer” problems will not destroy the record

CVV* can do this, with, from the voter’s POV  A voting system that will “just work”  The only additional effort required of the voter is to pull a lever up or down arbitrarily.  Caveat: a non-negligible percentage of voters or their representatives must make the effort to check their ballot receipts. * Based on a method by David Chaum

Election Goals  Integrity – Correct vote count.  Anonymity – I can’t tell how you voted.  Involuntary Privacy – You can’t prove to me how you voted.  Voter Verifiability – You, the voter, can verify the first two goals.  Public Verifiability – Anyone can verify the first three goals.  Robustness – If something goes wrong it can be detected and fixed

CVV Assumes  A set of n independent trustees, all of whom do not collude (can be made k of n) –Collusion can violate privacy without being detected –Collusion cannot violate integrity without detection  All n trustees are functional (can be made k of n) –A nonfunctional trustee (or > k nonfunctional trustees) can cause a denial of service attack

CVV Assumes  A not necessarily trustworthy polling machine –Cannot violate count integrity –Can violate privacy (sees ballot)  No collusion between authentication process and polling machine –Collusion can lead to ballot stuffing  Sufficiently large number of receipts checked – by voter or authorized third party –Requires process

poster

CVV is  A prototype implementation of Chaum’s voter-verifiable voting system  Using commonly available, low-cost hardware and OS platforms

Stage 2  Demo 1: walk-through

The Voting Process Ballot Casting  The voter uses the voting booth machine to generate some image: her vote.  The booth prints out two layers –which are random by themselves, –but when overlaid, display the image.

Layer generation The layers are generated using two strings of random numbers –Each created by adding trustee shares –Each of size half of the number of image pixels –One for the top layer, other for bottom –Laid in staggered form on the two layers R R R R R R R R R R R R R RR R

Layer generation  Other half pixels on each layer are such that the overlay is the correct vote  = Other vote:

Different types of receipts  Optical (additive) overlay: Chaum  Many other symbols by Jeroen van de Graf

The Voting Process Receipt Choice  The voter chooses one layer for her receipt. –Some other “stuff” is printed on the chosen layer. –The unchosen layer is destroyed. –The chosen layer is stored or transmitted  It can be shown that the machine can cheat in only one of the two receipts if the overlay represents the vote.

The Voting Process Receipt Checking  Receipts at counting station can all be checked, by a third party, for correctness.  A voter can check her own receipt has reached the counting station or have it checked by a third party.  Automated checking that a hard copy matches an image at counting station not yet implemented by CVV. Visual checking possible.

Cheating machine caught with probability half If the machine has cheated on a vote which has the check performed –it will be detected with non-negligible probability (one-half?) –this does not depend on the hardness of any problem using any computational model, but –on the randomness of the voter choice Does not depend on voter trust of poll worker checks

The Complete Ballot The receipt/vote has the following fields: –The vote ID –The encrypted image. –Information for trustees required to decrypt  the top layer.  the bottom layer –A signature of the vote ID  info required by non-trustee to recreate above for chosen layer, but  not unchosen one  used to check commitments. –A signature of the whole ballot to prevent false claims of uncounted votes { { PrechoicePrechoice PostchoicePostchoice

The Complete Ballot The information on the ballot –Can be used by anyone to verify that the ballot was correctly constructed, but –Cannot be used to decrypt the ballot except by appropriate combination of trustees.

The Vote-Decryption Process – similar to a regular MIX  Random pixels were generated using a different seed for each trustee for top and bottom  The seed of the chosen layer made available on the receipt for checking  The other seed made available in nested encrypted form for the trustees to generate random part of unchosen layer

The Vote-Decryption Process Each trustee: –for each ballot:  extracts his seed  incrementally regenerates the random numbers on the other layer  adds his share to the ballot –shuffles all the ballots –passes on the ballots to the next trustee

Receipt Decryption  R R R R R RR R = The other vote would have looked like

The Auditor  The first trustee is asked to reveal, to the public, a random half of his shuffle.  The next trustee reveals the other half.  And so forth –no ballot can be completely traced through the shuffles.

The Auditor  Each trustee provides –A correspondence between input and output images –A seed value Such that –the encryption of the seed with his public key gives the encrypted information –the difference between the output and input images of the revealed half of their shuffle was generated using the seed  Cheating trustee caught with probability half for every vote cheated on

Reduce “negative aspects” of voter verification by Participation by major political interests public interest organizations as: –Trustees –Third party working on behalf of voter to  Check that receipt is on website  Check that receipt was correctly generated (For this, need them to actively obtain receipts) –Witnesses of trustee decryption process and audit

Reduce “negative aspects” of voter verification by - II Process that includes encouraging voter verification when fraud detected or alleged: –If a voter claims his vote not counted, encourage enough voters to check their votes to determine extent of fraud/error –If a displayed receipt does not check, check receipts in that precinct to determine extent of fraud/error

Current status of CVV  Prototype implemented in Java  Currently supports low-end ink jet printing  Plan –Open source release –User-friendly ballots –Pre-packaged election tool kit for third-party elections (e.g. student elections). Those interested please contact us. –Construction of various other primitives for plug and play

More Next Steps  Performance and Robustness Testing and Enhancements  Trials in local and school elections –for education and –to test usefulness and acceptance of scheme  With Political Science and Public Affairs Faculty Determine if there is a difference in acceptance along group lines: –Political parties –Age –Race –Ability (among handicapped; Braille overlay methods can be developed)

References and Acknowledgements  David Chaum  David Chaum, “Secret-Ballot Receipts: True Voter- Verifiable Elections”, IEEE Security and Privacy, January-February 2004 (Vol. 2, No. 1)  Poorvi Vora, “David Chaum’s Voter Verification using Encrypted Paper Receipts”, Also on DIMACS website linked from talk abstract

Extras

1.Voter votes. Obtains an encrypted receipt that even she cannot decrypt outside polling booth only all n trustees can decrypt it this can be modified to k of n trustees. We will describe later how she can be sure the polling machine did not cheat 2.Voter checks for receipt on public website. If it is there, her vote has reached the counting station CVV - How it works based on Chaum voter-verifiable voting system

CVV - How it works 4.Possessor (voter or third party or anyone if receipt on website) can check if receipt is correctly generated. 5.All votes at counting station are serially (partially) decrypted and shuffled by trustees (version of MIX) 6.Final, unencrypted, shuffled votes are counted. Conditional count announced. 7.Trustee decryption and shuffle is audited. Final count announced, election certified.