Download presentation
Presentation is loading. Please wait.
Published byAleesha Arnold Modified over 9 years ago
1
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University
3
Secret Ballot
10
Florida 2000: Bush v. Gore
11
“Flawless”
12
12
13
Security FAIL
14
Analysis of an electronic voting system [Kohno et al. 2003, 2004] DRE trusts smartcards Hardcoded keys and initialization vectors Weak message integrity Cryptographically insecure random number generator...
15
California top-to-bottom reviews [Bishop, Wagner, et al. 2007] “Virtually every important software security mechanism is vulnerable to circumvention.” “An attacker could subvert a single polling place device...then reprogram every polling place device in the county.” “We could not find a single instance of correctly used cryptography that successfully accomplished the security purposes for which it was apparently intended.”
16
Why is this so hard?
17
17 PRIVACYVERIFIABILITY
18
18 …not just correctness …even if everyone cheats
19
VERIFIABILITY 19 Universal verifiability Voter verifiability Eligibility verifiability UV: [Sako and Killian 1994, 1995] EV & VV: [Kremer, Ryan & Smyth 2010]
20
PRIVACY 20 …more than secrecy …even if almost everyone cheats
21
PRIVACY 21 Coercion resistance better than receipt freeness or simple anonymity RF: [Benaloh 1994] CR: [Juels, Catalano & Jakobsson 2005]
22
ROBUSTNESS 22 Tally availability
23
23 PRIVACYVERIFIABILITY ROBUSTNESS
24
Remote 24 PRIVACYVERIFIABILITY (including Internet) ROBUSTNESS
25
H.R. 2647 Sec. 589 25 Military and Overseas Voter Empowerment Act
26
How can we vote securely, electronically, remotely? 26
27
Cornell Voting Systems CIVS (ca. 2005) [Myers & Clarkson] http://www.cs.cornell.edu/andru/civs.html Civitas 0.7 (ca. 2007) [Clarkson, Chong & Myers] http://www.cs.cornell.edu/projects/civitas Published Oakland 2008 + 2 Masters projects Civitas 1.0 (started fall 2010) [Clarkson et al.] 27
28
Cornell Voting Systems CIVS (ca. 2005) [Myers & Clarkson] http://www.cs.cornell.edu/andru/civs.html Civitas 0.7 (ca. 2007) [Clarkson, Chong & Myers] http://www.cs.cornell.edu/projects/civitas Published Oakland 2008 + 2 Masters projects Civitas 1.0 (started fall 2010) [Clarkson et al.] 28
29
Security Properties Original Civitas: Universal verifiability Eligibility verifiability Coercion resistance Masters projects: Voter verifiability Tally availability 29 …under various assumptions
30
Mutual Distrust 30 KEY PRINCIPLE:
31
31 JCJ Voting Scheme [Juels, Catalano & Jakobsson 2005] Proved universal verifiability and coercion resistance Civitas extends JCJ
32
32 Civitas Architecture bulletin board voter client tabulation teller registration teller ballot box
33
33 Registration voter client registration teller Voter retrieves credential share from each registration teller; combines to form credential
34
Credentials Verifiable Unsalable Unforgeable Anonymous 34
35
35 Voting voter client ballot box Voter submits copy of encrypted choice and credential to each ballot box
36
Resisting Coercion: Fake Credentials 36
37
37 Resisting Coercion If the coercer demands that the voter… Then the voter… Submits a particular voteDoes so with a fake credential. Sells or surrenders a credential Supplies a fake credential. AbstainsSupplies a fake credential to the adversary and votes with a real one.
38
38 Tabulation bulletin board tabulation teller ballot box Tellers retrieve votes from ballot boxes
39
39 Tabulation bulletin board tabulation teller Tabulation tellers anonymize votes; eliminate unauthorized (and fake) credentials; decrypt remaining choices.
40
40 Auditing bulletin board Anyone can verify proofs that tabulation is correct ballot box
41
41 Civitas Architecture bulletin board voter client tabulation teller registration teller ballot box Universal verifiability: Tellers post proofs during tabulation Coercion resistance: Voters can undetectably fake credentials S ECURITY P ROOFS
42
42 Protocols –El Gamal; distributed [Brandt]; non-malleable [Schnorr and Jakobsson] –Proof of knowledge of discrete log [Schnorr] –Proof of equality of discrete logarithms [Chaum & Pederson] –Authentication and key establishment [Needham-Schroeder- Lowe] –Designated-verifier reencryption proof [Hirt & Sako] –1-out-of-L reencryption proof [Hirt & Sako] –Signature of knowledge of discrete logarithms [Camenisch & Stadler] –Reencryption mix network with randomized partial checking [Jakobsson, Juels & Rivest] –Plaintext equivalence test [Jakobsson & Juels] Implementation: 21k LoC
43
Trust Assumptions 43
44
44 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller.
45
45 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. Universal verifiability Coercion resistance Coercion resistance
46
46 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
47
47 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
48
48 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
49
Registration 49 In person. In advance. Con:System not fully remote Pro:Credential can be used in many elections
50
50 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
51
Eliminating Trust in Voter Client 51 UV: Use challenges CR: Open problem
52
52 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
53
53 Trust Assumptions` 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
54
54 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
55
Untappable Channel 55 Minimal known assumption for receipt freeness and coercion resistance Eliminate? Open problem. (Eliminate trusted registration teller? Also open.)
56
56 Trust Assumptions 1. “Cryptography works.” 2. The adversary cannot masquerade as a voter during registration. 3. Voters trust their voting client. 4. At least one of each type of authority is honest. 5. The channels from the voter to the ballot boxes are anonymous. 6. Each voter has an untappable channel to a trusted registration teller. UV + CR CR
57
Trusted procedures? 57
58
Time to Tally 58
59
59 Tabulation Time # voters in precinct = K, # tab. tellers = 4, security strength ≥ 112 bits [NIST 2011–2030]
60
60 Summary Can achieve strong security and transparency: –Remote voting –Universal (voter, eligibility) verifiability –Coercion resistance Security is not free: –Stronger registration (untappable channel) –Cryptography (computationally expensive)
61
Assurance 61 Security proofs (JCJ) Secure implementation (Jif)
62
Ranked Voting 62
63
63 Open Problems Coercion-resistant voter client? Eliminate untappable channel in registration? Credential management? Application-level denial of service?
64
http://www.cs.cornell.edu/projects/civitas (google “civitas voting”)
65
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.