Andreas Steffen, 26.06.2009, LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.

Slides:



Advertisements
Similar presentations
Trusting the Vote Ben Adida - Cryptography and Information Security Group MIT Computer Science and Artificial.
Advertisements

Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Electronic Voting Systems
Talk by Vanessa Teague, University of Melbourne Joint work with Chris Culnane, James Heather & Steve Schneider at University of.
Prêt à Voter A brief (heavily biased) history of verifiable voting Bertinoro 2010P Y A Ryan Prêt à Voter1 Peter Y A Ryan University of Luxembourg.
Electronic Voting System Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin Dan S. Wallach IEEE Symp. On Security and Privacy 2004 VoteHere System Analysis,
Electronic Voting Ronald L. Rivest MIT CSAIL Norway June 14, 2004.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
A Pairing-Based Blind Signature
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
Electronic Voting: Danger and Opportunity J. Alex Halderman Department of Computer Science Center for Information Technology Policy Princeton University.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy.
Self-Enforcing E-Voting (SEEV) Feng Hao Newcastle University, UK CryptoForma’13, Egham.
TGDC Meeting, July 2011 Review of VVSG 1.1 Nelson Hastings, Ph.D. Technical Project Leader for Voting Standards, ITL
Josh Benaloh Senior Cryptographer Microsoft Research.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
Kickoff Meeting „E-Voting Seminar“
Trustworthy Elections without Paper Ballots Why vote receipts deserve consideration May 26, 2004 C. Andrew Neff, Ph.D. Chief Scientist VoteHere, Inc.
August 6, 2007Electronic Voting Technology 2007 On Estimating the Size and Confidence of a Statistical Audit Javed A. Aslam College of Computer and Information.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
PRESENTED BY CHRIS ANDERSON JULY 29, 2009 Using Zero Knowledge Proofs to Validate Electronic Votes.
Voting System Qualification How it happens and why.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Informatics Online Voting Opportunities and Risks STOA Workshop at the European Parliament Brussels, 17 March 2011 Prof. Dr. Rüdiger Grimm IT Risk Management.
Author: Michał Rajkowski Tutor: prof. dr hab. inż. Zbigniew Kotulski.
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Election Administration. Ensuring legitimacy of the government Legitimacy: acceptance of the right of public officials to hold office and to promulgate.
Security of Voting Systems Ronald L. Rivest MIT CSAIL Given at: GWU Computer Science Dept. November 9, 2009.
Perspectives on “End-to-End” Voting Systems Ronald L. Rivest MIT CSAIL NIST E2E Workshop George Washington University October 13, 2009 Ballot Bob Ballot.
A Brief Intro to Aperio and Eperio Aleksander Essex University of Waterloo, *University of Ottawa SecVote 2010 Sept. 3, Bertinoro Italy.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Cryptographic Voting Systems (Ben Adida) Jimin Park Carleton University COMP 4109 Seminar 15 February 2011.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
E-Voting Dissent Sara Wilson, Katie Noto, John Massie, Will Sutherland, Molly Cooper.
Audit Trail
A. Steffen, , Kickoff.pptx 1 Kickoff Meeting „E-Voting Seminar“ An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für.
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
The Paillier Cryptosystem
“The right of citizens of the United States to vote shall not be denied or abridged by the United States or by any state on account of [race, color, or.
Political Process 3.6 Politics and Government. E- voting Electronic voting systems for electorates have been in use since the 1960s when punched card.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
WHY THE vvpat has failed
Electronic Voting: Danger and Opportunity
The Administration of Elections Extent of Federal control Elections need to be free, honest, and accurate Most election law in the U.S. is State Law.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
VVPAT Building Confidence in U.S. Elections. WHAT IS VVPAT ? Voter-verifiable paper audit trail Requires the voting system to print a paper ballot containing.
Auditability and Verifiability of Elections Ronald L. Rivest MIT ACM-IEEE talk March 16, 2016.
TGDC Meeting, Jan 2011 Report from Workshop on UOCAVA Remote Voting Systems Nelson Hastings National Institute of Standards and Technology
What is electronic voting An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily.
Secure, verifiable online voting 29 th June 2016.
Ronald L. Rivest MIT NASEM Future of Voting Meeting June 12, 2017
Security of Voting Systems
Perspectives on “End-to-End” Voting Systems
EVoting 23 October 2006.
ThreeBallot, VAV, and Twin
E-voting …and why it’s good..
ELECTRONIC VOTING SYSTEMS André Martins Hugo António Miguel Cordeiro
Ronald L. Rivest MIT NASEM Future of Voting December 7, 2017
Practical Aspects of Modern Cryptography
ISI Day – 20th Anniversary
Auditability and Verifiability of Elections
eVoting System Proposal
Ronald L. Rivest MIT ShafiFest January 13, 2019
Presentation transcript:

Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik Rapperswil

Andreas Steffen, , LinuxTag2009.ppt 2 Where the heck is Rapperswil?

Andreas Steffen, , LinuxTag2009.ppt 3 HSR - Hochschule für Technik Rapperswil University of Applied Sciences with about 1000 students Faculty of Information Technology ( students) Bachelor Course (3 years), Master Course (+1.5 years)

Andreas Steffen, , LinuxTag2009.ppt 4 Cryptographic Voting Systems Due to repeated failures and detected vulnerabilities in both electro-mechanical and electronic voting machines, voters have somehow lost faith that the outcome of a poll always represents the true will of the electorate. Manual counting of paper ballots is not really an option in the 21 st century and is not free from tampering either. Modern cryptographic voting systems allow true end-to-end verification of the complete voting process by any individual voter, without sacrificing secrecy and privacy. Summary of my talk:

Andreas Steffen, , LinuxTag2009.ppt 5 Direct Recording Electronic Voting Machines In the 2006 mid-term federal elections, one third of registered U.S. voters used Direct Recording Electronic (DRE) voting machines. In the 2008 federal elections, many states returned to paper ballots with optical scanning but six states used 100% DREs without a Voter-Verified Paper Audit Trail (VVPAT). Diebold Elections System DRE voting machine with a VVPAT attachment.

Andreas Steffen, , LinuxTag2009.ppt 6 Losing Trust in Electronic Voting Systems Princeton study on Diebold DRE: Hack the vote? No problem Dutch ES3B voting machines: Hacked to play chess The Morning Call: Voter smashes DRE in Allentown with metal cat March Germany: Bundesverfassungsgericht bans e-voting machines

Andreas Steffen, , LinuxTag2009.ppt 7 Traditional Chain-of-Custody Security Tallying Source: Ben Adida, Ph.D. Thesis 2006 Software Verification Sealing Verification by proxy only

Andreas Steffen, , LinuxTag2009.ppt 8 Desirable: End-to-End Verification by Voter Source: Ben Adida, Ph.D. Thesis 2006 Secrecy? Privacy?

Andreas Steffen, , LinuxTag2009.ppt 9 End-to-End Auditable Voting System (E2E) Any voter can verify that his or her ballot is included unmodified in a collection of ballots. Any voter (and typically any independent party additionally) can verify [with high probability] that the collection of ballots produces the correct final tally. No voter can demonstrate how he or she voted to any third party (thus preventing vote-selling and coercion). Source: Wikipedia

Andreas Steffen, , LinuxTag2009.ppt 10 Solution: Cryptographic Voting Systems Source: Ben Adida, Ph.D. Thesis 2006 AB C A B C threshold

Andreas Steffen, , LinuxTag2009.ppt 11 Proposed E2E Systems Punchscan by David Chaum. Prêt à Voter by Peter Ryan. Scratch & Vote by Ben Adida and Ron Rivest. ThreeBallot by Ron Rivest (paper-based without cryptography) Scantegrity II by David Chaum, Ron Rivest, Peter Ryan et al. (add-on to optical scan voting systems using Invisible Ink) Helios by Ben Adida (

Andreas Steffen, , LinuxTag2009.ppt 12 Helios (

Andreas Steffen, , LinuxTag2009.ppt 13 Create a New Election

Andreas Steffen, , LinuxTag2009.ppt 14 Generate ElGamal Private/Public Key Pair

Andreas Steffen, , LinuxTag2009.ppt 15 Enter Questions and Voter Lists

Andreas Steffen, , LinuxTag2009.ppt 16 Freeze Election [and Election Fingerprint]

Andreas Steffen, , LinuxTag2009.ppt 17 Start Voting Process

Andreas Steffen, , LinuxTag2009.ppt 18 Invite Voters per

Andreas Steffen, , LinuxTag2009.ppt 19 Voting Entry Page

Andreas Steffen, , LinuxTag2009.ppt 20 Fill in the Ballot

Andreas Steffen, , LinuxTag2009.ppt 21 Encrypt Ballot

Andreas Steffen, , LinuxTag2009.ppt 22 Optionally Audit Ballot

Andreas Steffen, , LinuxTag2009.ppt 23 Documented Ballot Format

Andreas Steffen, , LinuxTag2009.ppt 24 Verify Ballot

Andreas Steffen, , LinuxTag2009.ppt 25 Cast Ballot

Andreas Steffen, , LinuxTag2009.ppt 26 Voter Authentication

Andreas Steffen, , LinuxTag2009.ppt 27 Vote Submitted

Andreas Steffen, , LinuxTag2009.ppt 28 Receipt per

Andreas Steffen, , LinuxTag2009.ppt 29 Public Bulletin Board

Andreas Steffen, , LinuxTag2009.ppt 30 Start Tallying

Andreas Steffen, , LinuxTag2009.ppt 31 Final Voting Results

Andreas Steffen, , LinuxTag2009.ppt 32 Public Audit of Voting Process

Andreas Steffen, , LinuxTag2009.ppt 33 Conclusion Modern Cryptographic Voting Systems allow true end-to-end verification of the whole voting process by anyone while maintaining a very high level of secrecy. Due to the advanced mathematical principles they are based on, Cryptographic Voting Systems are not easy to understand and are therefore not readily accepted by authorities and the electorate. But let‘s give Cryptographic Voting Systems a chance! They can give democracy a new meaning in the 21 st century!