Masked Ballot Voting for Receipt-Free Online Elections Sam Heinith, David Humphrey, and Maggie Watkins.

Slides:



Advertisements
Similar presentations
Non-interactive Zero- Knowledge Arguments for Voting Jens Groth UCLA.
Advertisements

Research & Development Workshop on e-Voting and e-Government in the UK - February 27, 2006 Votinbox - a voting system based on smart cards Sébastien Canard.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran.
Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Cryptography Project Josué David Zapata Vázquez Professor André Luiz Moura dos Santos Cryptography Course Electrical and Computer Engineering Department.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
1 e-voting (requirements & protocols) 1) Aggelos Kiayias, Moti Yung: Self-tallying Elections and Perfect Ballot Secrecy 2) Jens Groth: Efficient Maximal.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Civitas Verifiability and Coercion Resistance for Remote Voting University of South Alabama August 15, 2012 Michael Clarkson The George Washington University.
Civitas Security and Transparency for Remote Voting Swiss E-Voting Workshop September 6, 2010 Michael Clarkson Cornell University with Stephen Chong (Harvard)
A Pairing-Based Blind Signature
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran Joint work with Moni Naor.
Civitas A Secure Remote Voting System Michael Clarkson, Stephen Chong, Andrew Myers Cornell University Dagstuhl Seminar on Frontiers of Electronic Voting.
Electronic Voting Presented by Ben Riva Based on presentations and papers of: Schoenmakers, Benaloh, Fiat, Adida, Reynolds, Ryan and Chaum.
Civitas Verifiability and Coercion Resistance for Remote Voting Virginia Tech NCR September 14, 2012 Michael Clarkson George Washington University with.
Self-Enforcing E-Voting (SEEV) Feng Hao Newcastle University, UK CryptoForma’13, Egham.
The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Research & development A Practical and Coercion-resistant scheme for Internet Voting Jacques Traoré (joint work with Roberto Araújo and Sébastien Foulle)
Pretty Good Voting (PGV) Christian Bell, Jason Duell, Amir Kamil Computer Security CS 261 Fall 2004.
Tree Homomorphic Encryption with Scalable Decryption Moti Yung Columbia University Joint work with Aggelos Kiayias University of Connecticut.
Paillier Threshold Encryption WebService by Brett Wilson.
1/11/2007 bswilson/eVote-PTCWS 1 Enhancing PTC based Secure E-Voting System (note: modification of Brett Wilson’s Paillier Threshold Cryptography Web Service.
A (Brief) Comparison of Cryptographic Schemes for Electronic Voting
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY Sakurai Lab. Kyushu University Dr-course HER, Yong-Sork E-voting VS. E-auction.
CSI-4138/CEG-4394 Design of Secure Computer Systems Virtual Election Booth Lab Project Jean-Yves Chouinard Fall 2002.
Cryptographic Voting Systems (Ben Adida) Jimin Park Carleton University COMP 4109 Seminar 15 February 2011.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
The Electoral Process Chapter 7.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Research & development Towards Practical Coercion-Resistant Electronic Elections Jacques Traoré France Télécom / Orange Labs SecVote 2010 Bertinoro - Italy.
Identification Verification. Verification Required Election Day Registration Mail-in Only if Driver’s License # or Social Security # does not validate.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Remote Prêt à Voter 1.0 (FPTP): a voter-verifiable and receipt-free remote voting Zhe Xia (Joson) July 19, 2012.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Secure, verifiable online voting 29 th June 2016.
A Practical Voting Scheme Using One Server with a Secure Coprocessor
Recipt-free Voting Through Distributed Blinding
ThreeBallot, VAV, and Twin
E-voting …and why it’s good..
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Group theory exercise.
At the polls on Election Day
October 15 October 30 by 5:00 p.m. November 3 by 5:00 p.m. November 6
ISI Day – 20th Anniversary
eVoting System Proposal
The Italian Academic Community’s Electronic Voting System
General Election -- November 6, 2018 Website: edo91.zendesk.com
Electronic Payment Security Technologies
Computer Security Chapter Two
Ronald L. Rivest MIT ShafiFest January 13, 2019
Voting: how to register and cast your vote
Presentation transcript:

Masked Ballot Voting for Receipt-Free Online Elections Sam Heinith, David Humphrey, and Maggie Watkins

Why Online Voting? - Quick election results - No paper ballot recounts - Less costly for the voter than mail-in elections - No long lines to vote - Faster than mailing in absentee ballots

Requirements For Secure Online Voting Universally Verifiable Receipt Free Individually Verifiable Untappable Channels Anonymous Channels

How Masked Ballot Voting for Receipt-Free Online Elections Works - Three stages to an election stage 1: Registration stage 2: Voting stage 3: Unmasking - Security ElGamal Encryption ensures a vote cannot be linked to a voter (secret ballots)

During an Election Bulletin Board Registrar/ Authority Voter Private Public

Bulletin Board Registrar/ Authority m, d V, 〚 m 〛 Store Private Key Publish Public Key Voter Stage 1: Registration Public Private m = unique mask d = security verifier 〚 m 〛 = encrypted mask V = unique voter ID

Voter Bulletin Board Registrar/ Authority 〚 vote - m 〛, p Public Stage 2: Voting 〚 vote - m 〛 = masked and encrypted vote p = proof of plaintext knowledge Private

Voter Bulletin Board Registrar/ Authority V, 〚 vote 〛 Electio n Results Unencrypted Results to be counted vote Public Stage 3: Unmasking 〚 vote 〛 = encrypted vote Read from BB Private

ElGamal Encryption - The Masked Ballot Voting scheme depends on a homomorphic encryption system because the masking and unmasking happens while the vote is still encrypted. - ElGamal is a Homomorphic encryption system. A homomorphic encryption system allows for performing operations on the cyphertext that predictably change the plaintext. Example of homomorphic property of ElGamal: 〚 vote - m 〛 = 〚 vote 〛 - 〚 m 〛 Decrypts to: vote - m

Assumptions Authority is not corrupt Authority has plenty of processing power Voters have little processing power Untappable channel during registration Voting is an atomic process

Sources Wen, Roland, and Richard Buckland. "Masked Ballot Voting for Receipt-Free Online Elections." Lecture Notes in Computer Science, vol (2009): pp Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: Wiley, Print. (sited over 8,000 times according to Google Scholar)

Download Our Code!

Demonstration

Questions?