Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.

Slides:



Advertisements
Similar presentations
An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems.
Advertisements

Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Electronic Voting Systems
Pretty Good Democracy James Heather, University of Surrey
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
Talk by Vanessa Teague, University of Melbourne Joint work with Chris Culnane, James Heather & Steve Schneider at University of.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Civitas Verifiability and Coercion Resistance for Remote Voting University of South Alabama August 15, 2012 Michael Clarkson The George Washington University.
Civitas Security and Transparency for Remote Voting Swiss E-Voting Workshop September 6, 2010 Michael Clarkson Cornell University with Stephen Chong (Harvard)
A Pairing-Based Blind Signature
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
Defeating Malicious Terminals in an Electronic Voting System Daniel Hanley Andre dos Santos Jeff King Georgia Tech Information Security Center.
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures and Hash Functions. Digital Signatures.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran Joint work with Moni Naor.
A method for electronic voting with Coercion-free receipt David J. Reynolds (unaffiliated)
Self-Enforcing E-Voting (SEEV) Feng Hao Newcastle University, UK CryptoForma’13, Egham.
The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Research & development A Practical and Coercion-resistant scheme for Internet Voting Jacques Traoré (joint work with Roberto Araújo and Sébastien Foulle)
Applying Cryptography --lottery, anonymous authentication, and voting-- Kazue Sako
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
Ben Hosp, Nils Janson, Phillipe Moore, John Rowe, Rahul Simha, Jonathan Stanton, Poorvi Vora {bhosp, simha, jstanton, Dept. of Computer.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
PRESENTED BY CHRIS ANDERSON JULY 29, 2009 Using Zero Knowledge Proofs to Validate Electronic Votes.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Secret Ballot Receipts True Voter-Verifiable Elections Richard Carback Kevin Fisher Sandi Lwin CMSC 691v April 3, 2005.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
(Business) Process Centric Exchanges
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
The Paillier Cryptosystem
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
Lecture 5.1: Message Authentication Codes, and Key Distribution
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Outline Encryption Algorithms Authentication Protocols
Recipt-free Voting Through Distributed Blinding
ThreeBallot, VAV, and Twin
ISI Day – 20th Anniversary
Systems Design Chapter 6.
eVoting System Proposal
Ronald L. Rivest MIT ShafiFest January 13, 2019
BPSec: AD Review Comments and Responses
Presentation transcript:

Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of the 14 th Usenix Security Symposium held in Baltimore on July 31st-August 5 th, 2005 Presenter: Rick Carback

Overview Selection Criteria Motivation Results New and Significant Goals of Secure Voting Systems Neff’s Protocol Attacks and Mitigations Subliminal Channels Human Unreliability Denial of Service Secure Voting Protocol Implementation Future Work Conclusions

Paper Selection Criteria Chris Karloff and Naveen Sastry are both 5 th year graduate students. David Wagner DIMACS Special Focus on Security Organizing committee member ACM CCS 2004 Program committee member USENIX Security 2006 Program committee member IEEE Security & Privacy 2006 Program committee member

Motivation Chose protocols by Neff and Chaum because they are revolutionary Viewed Neff and Chaum protocols as part of a complete voting system What are the weaknesses of these schemes in complete systems if implemented? Can these ideas work in the real world?

Results

New and Significant Enumerates E-Voting goals Analysis of Cryptographic Protocols in the larger systems context Exposes weaknesses in implementation of cryptographic protocols Provides countermeasures for these weaknesses Identified new challenges and open problems in electronic voting systems.

Goals of Secure Voting Systems Cast-as-Intended Counted-as-Cast Verifiability One voter, One vote Coercion Resistance Privacy

Neff’s Scheme Distributed Key Generation Protocol (Similar to Chaum's Scheme) DRE constructs a VC, a matrix of BMPs. Each row represents one candidate. BMPs are all (0, 0) or (1, 1) for the chosen candidate and (0, 1) or (1, 0) for the others.

Neff’s Scheme (cont.) DRE picks a pledge bit for each BMP for the chosen candidate, voter can verify by picking a side for each one. OVC is created with this information. Voter checks that challenge is correct on bulletin board.

Vote Here Receipts

Vote Here Bulletin Board

Subliminal channels Arises when DRE is free to chose the random values that are used. All randomized encryption schemes can contain subliminal channels. (Goldwasser, 1984) Through special selection of a random number r, the DRE can encode the sizeof(r) bits. Can hide a bit by repeatedly choosing a random number until you get what you want. Expected work is O(2 x ) to encrypt x bits.

Random Subliminal Channel Attack Neff's scheme makes extensive use of randomness. Each BMP has one side of it revealing the random parameter used in that side of the pair. If the DRE chooses the same random parameter for both sides it will always be revealed in the ballot. The random parameter is guaranteed to be revealed, allowing a number of bits equal to the size of the parameter to be sent subliminally for each BMP.

Avoiding Random Subliminal Attacks Change protocol so that it does not require randomness Very tricky Random tapes Trusted Hardware

Semantic Subliminal Channels Voters are unlikely to detect subtle changes (fonts, pixel, etc) Can use simple policy, no computational complexity Apparent only after decryption, not on the bulletin board

Mitigating Semantic Channels Unambiguous formats for ballots and all ballots tested for conformance Bad ballots cannot be posted on the bulletin board But this may violate other policies!

Human Unreliability Protocol security hinges on DRE not knowing how the voter will make future decisions Interactions must happen in a particular order Voter may not notice deviations in protocol Voter must monitor DRE output Most people don’t care People often make mistakes How does a voter prove the machine is wrong?

Message Reordering

Message Reordering (cont.)

Human Unreliability (cont.) Discarded Receipts DRE Generates Invalid Signature Voter cannot prove if the receipt was forged Printing incorrect DRE Machine ID Ignoring voter input Valid receipt, but not what voter chose

Mitigating Human Unreliability Parallel Testing Voter Education It should not be so hard to use a voting machine Shredders for receipts Verify Signature at voting station Needs another set of trusted software/hardware Preprinted Machine IDs

Denial of Service Malicious DREs can delete, alter, or stuff ballots Detectable, but still effective Malicious Tallying/Bulleting Board software Could delete keys, ballots, etc. Could be selective Target polling stations favoring undesired candidate

DoS Mitigation Strategies Revote Costly Voter Verified Paper Audit Trail Not secure

Implementing Secure Voting Systems Bulletin Board Required Properties? What Architecture? BSN Assignment User Friendly Interfaces Tallying Software Specification

Future Work Cryptographic protocols that prevent subliminal channels Mix-net security models Definition for security in the voting setting Humans as protocol participants Can we educate without discouraging participation and hurting trust?

Conclusions Every attack discussed requires malicious software (DRE/bulletin board/tallying) Is this better than what we currently have? What about non-malicious problems? Connectivity? Hardware failure?

References Votehere.com “Cryptographic Voting Protocols: A Systems Perspective”, Chris Karlof, Naveen Sastry, David Wagner