kickoff meeting „ e-voting seminar“

Post on 24-Feb-2016

56 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Kickoff Meeting „ E-Voting Seminar“. An Introduction to Cryptographic Voting Systems Prof. Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch. Cryptographic Voting Systems . Summary of my talk:. - PowerPoint PPT Presentation

TRANSCRIPT

A. Steffen, 17.09.2009, Kickoff.pptx 1

Kickoff Meeting „E-Voting Seminar“

An Introduction toCryptographic Voting

SystemsProf. Andreas Steffen

Hochschule für Technik Rapperswilandreas.steffen@hsr.ch

A. Steffen, 17.09.2009, Kickoff.pptx 2

Cryptographic Voting Systems

• Due to repeated failures and detected vulnerabilities in both electro-mechanical and electronic voting machines, voters have somehow lost faith that the outcome of a poll always represents the true will of the electorate.

• Even more uncertain is electronic voting over the Internet which is potentially prone to coercion and vote-selling (this doesn‘t seem to be an issue in Switzerland).

• Manual counting of paper ballots is not really an option in the21st century and is not free from tampering either.

• Modern cryptographic voting systems allow true end-to-end verification of the complete voting process by any individual voter, without sacrificing secrecy and privacy.

Summary of my talk:

A. Steffen, 17.09.2009, Kickoff.pptx 3

Losing Trust in Electronic Voting Systems

2006 - Princeton study on Diebold DRE:

Hack the vote? No problem2006 - Dutch ES3B voting machines:

Hacked to play chess

2006 - The Morning Call:

Voter smashes DRE inAllentown with metal

cat

March 3 2009 - Germany:

Bundesverfassungsgericht

bans unverifiable E-voting

A. Steffen, 17.09.2009, Kickoff.pptx 4

E-Voting in my home town Schlieren

Hidden PIN

„Internet-based voting does not have tobe more secure as voting per snail mail“Justice Department of the Canton of Zurich

A. Steffen, 17.09.2009, Kickoff.pptx 5

[In]Security Features

???

Protection fromMan-in-the-Middle

attacks

A. Steffen, 17.09.2009, Kickoff.pptx 6

E-Voting Website

A. Steffen, 17.09.2009, Kickoff.pptx 7

Voter Login

A. Steffen, 17.09.2009, Kickoff.pptx 8

Ballot (PHP Form)

A. Steffen, 17.09.2009, Kickoff.pptx 9

E-Voting in my home town Schlieren

PIN

A. Steffen, 17.09.2009, Kickoff.pptx 10

Voter Authentication

A. Steffen, 17.09.2009, Kickoff.pptx 11

Transmission Receipt

A. Steffen, 17.09.2009, Kickoff.pptx 12

Conclusion

So what?„You are not allowed to know. The exact transactionprocessing is kept secret due to security reasons“

Justice Department of the Canton of Zurich

A. Steffen, 17.09.2009, Kickoff.pptx 13

Traditional Chain-of-Custody Security

Tallying

Source: Ben Adida, Ph.D. Thesis 2006

Software VerificationSealing

Verification by proxy only

A. Steffen, 17.09.2009, Kickoff.pptx 14

Desirable: End-to-End Verification by Voter

Source: Ben Adida, Ph.D. Thesis 2006

Secrecy?Privacy?

A. Steffen, 17.09.2009, Kickoff.pptx 15

End-to-End Auditable Voting System (E2E)

• Any voter can verify that his or her ballot is included unmodified in a collection of ballots.

• Any voter (and typically any independent party additionally) can verify [with high probability] that the collection of ballots produces the correct final tally.

• No voter can demonstrate how he or she voted to any third party (thus preventing vote-selling and coercion).

Source: Wikipedia

A. Steffen, 17.09.2009, Kickoff.pptx 16

Solution: Cryptographic Voting Systems

Source: Ben Adida, Ph.D. Thesis 2006

A B C

A

B

C

Threshold Decryption

ElGamal / Paillier

HomomorphicTallying

Mixnet

Tamper-ProofBulletin Board

A. Steffen, 17.09.2009, Kickoff.pptx 17

Proposed E2E Systems

• Punchscan by David Chaum.• Prêt à Voter by Peter Ryan.• Scratch & Vote by Ben Adida and Ron Rivest.• ThreeBallot by Ron Rivest (paper-based without

cryptography)• Scantegrity II by David Chaum, Ron Rivest, Peter Ryan et

al.(add-on to optical scan voting systems using Invisible Ink)

• Helios by Ben Adida (http://www.heliosvoting.org/)

A. Steffen, 17.09.2009, Kickoff.pptx 18

Scratch & Vote Ballot

Obama

McCainNone

Source: Ben Adida, Ph.D. Thesis 2006

Randomized

candidate list

2D barcode

Scratch surfacer1r2r3

Encryptpk(256, r1)

Encryptpk(20 , r2)

Encryptpk(228, r3)

ElGamal or PaillierPublic Key Encryption

Random Key

Perforation

A. Steffen, 17.09.2009, Kickoff.pptx 19

Homomorphic Counters

One vote for Obama

Source: Ben Adida, Ph.D. Thesis 2006

256 00...01

00...00

00...00

One vote for McCain228 00...00

00...01

00...00

One vote for None20 00...00

00...00

00...01

Tallying Counter00...10

00...01

00...00

Multiplication of all encrypted votes with Tallying Counteraccumulates votes in the candidates‘ counters in encrypted

form.

Obama McCain None

Total number of registered U.S. voters < 228 (28 bits)1024 bit Paillier Public Key Cryptosystem could handle 35

candidates

A. Steffen, 17.09.2009, Kickoff.pptx 20

Pre-Voting Verification I

McCain

NoneObama

Source: Ben Adida, Ph.D. Thesis 2006

None

McCainObama

Valerie the VoterVote Audit

A. Steffen, 17.09.2009, Kickoff.pptx 21

Pre-Voting Verification II

McCain

NoneObama

Source: Ben Adida, Ph.D. Thesis 2006

None

McCainObama

Valerie the VoterVote Audit

r1 r2 r3

None

McCainObama

A. Steffen, 17.09.2009, Kickoff.pptx 22

Casting the Ballot I

McCain

NoneObama

Source: Ben Adida, Ph.D. Thesis 2006

Valerie the Voter

A. Steffen, 17.09.2009, Kickoff.pptx 23

Casting the Ballot II

Source: Ben Adida, Ph.D. Thesis 2006

Valerie the Voter

McCain

NoneObama

Ed theElection Official

A. Steffen, 17.09.2009, Kickoff.pptx 24

Casting the Ballot III

Source: Ben Adida, Ph.D. Thesis 2006

Valerie the Voter

OpticalScanner

Keep asa receipt

Ed theElection Official

A. Steffen, 17.09.2009, Kickoff.pptx 25

Post-Voting Verification

Source: Ben Adida, Ph.D. Thesis 2006

Valerie the Voter

Valerie Vanessa VictorWeb Bulletin Board

A. Steffen, 17.09.2009, Kickoff.pptx 26

Tally and Decryption of Final Result

Source: Ben Adida, Ph.D. Thesis 2006

Vanessa VictorWeb Bulletin Board

0101101...11100100011

Homomorphic Addition

Encrypted tallying counter

Valerie00...1

000...0

100...0

0

Obama McCain None

Democrats

Threshold decryption withshared private key

Republicans

Independents

A. Steffen, 17.09.2009, Kickoff.pptx 27

Conclusion

• Modern Cryptographic Voting Systems allow true end-to-end verification of the whole voting process by anyone while maintaining a very high level of secrecy.

• Due to the advanced mathematical principles they are based on, Cryptographic Voting Systems are not easy to understand and are therefore not readily accepted by authorities and the electorate.

• But let‘s give Cryptographic Voting Systems a chance!They can give democracy a new meaning in the 21st century!

top related