1 Cryptographic Elections: Challenges and Opportunities Alon Rosen - - PowerPoint PPT Presentation

1 cryptographic elections challenges and opportunities
SMART_READER_LITE
LIVE PREVIEW

1 Cryptographic Elections: Challenges and Opportunities Alon Rosen - - PowerPoint PPT Presentation

1 Cryptographic Elections: Challenges and Opportunities Alon Rosen IDC Herzliya June 9, 2010 2 Thanks Ben Adida (Harvard University) Yuval Kedem (Gallileo) David Movshovitz (IDC Herzlyia) Shimon Schocken (IDC Herzlyia)


slide-1
SLIDE 1

1

slide-2
SLIDE 2

Cryptographic Elections: Challenges and Opportunities

Alon Rosen IDC Herzliya June 9, 2010

2

slide-3
SLIDE 3

Thanks

  • Ben Adida (Harvard University)
  • Yuval Kedem (Gallileo)
  • David Movshovitz (IDC Herzlyia)
  • Shimon Schocken (IDC Herzlyia)
  • Amnon Ta-Shma (T

el Aviv University)

3

slide-4
SLIDE 4

This Talk

Part I

➡ Electronic voting in US ➡ The Israeli perspective

Part II

➡ Why is voting so hard? ➡ Cryptographic voting.

4

slide-5
SLIDE 5

http://www.nytimes.com/2008/01/06/magazine/06Vote-t.html 5

slide-6
SLIDE 6

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-7
SLIDE 7

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-8
SLIDE 8

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-9
SLIDE 9

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-10
SLIDE 10

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-11
SLIDE 11

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-12
SLIDE 12

Voting in the US

http://www.cs.uiowa.edu/~jones/voting/pictures/ 6

slide-13
SLIDE 13

7

slide-14
SLIDE 14
  • HAVA - Help America

Vote Act

  • 4 Billion dollars allocated
  • Mostly to replace voting machines

7

slide-15
SLIDE 15
  • HAVA - Help America

Vote Act

  • 4 Billion dollars allocated
  • Mostly to replace voting machines

7

slide-16
SLIDE 16

The Princeton Report

  • Diebold touch-screen runs

executable code loaded from memory card

  • All audit logs modified

to be consistent

  • Can spread virally by

memory card.

[FHF2006]

8

slide-17
SLIDE 17
  • New Mexico (March 2006)
  • California (August 2007)
  • Florida (December 2007)
  • Ohio (January 2008)
  • Iowa (March 2008)
  • ...
  • States that mandate paper trail.

9

slide-18
SLIDE 18

10

slide-19
SLIDE 19

Debra Bowen

10

slide-20
SLIDE 20
  • Simple and reliable system
  • Voter secrecy
  • Quick count
  • And in addition: transparency (open audit).

What does Everbody Want?

11

slide-21
SLIDE 21

What is Transparency?

Anyone can verify that:

  • their vote was cast as intended
  • the votes were count as cast

12

slide-22
SLIDE 22

Paper vs. Electronic

Electronic elections today:

  • Global attacks
  • Undetectable
  • Unrecoverable
  • No transparency

Paper elections:

  • Local attacks
  • No transparency

13

slide-23
SLIDE 23

Paper vs. Electronic

Electronic elections today:

  • Global attacks
  • Undetectable
  • Unrecoverable
  • No transparency

Paper elections:

  • Local attacks
  • No transparency

Ideally:

  • No local/global attacks
  • Full transparency

13

slide-24
SLIDE 24

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg 14

slide-25
SLIDE 25

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg 14

slide-26
SLIDE 26

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg

  • Little defense against insiders

14

slide-27
SLIDE 27

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg

  • Little defense against insiders
  • Failures are obvious

14

slide-28
SLIDE 28

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg

  • Little defense against insiders
  • Failures are obvious

14

slide-29
SLIDE 29

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg

  • Little defense against insiders
  • Failures are obvious
  • Complete audit logs

14

slide-30
SLIDE 30

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg

  • Little defense against insiders
  • Failures are obvious
  • Complete audit logs
  • Transferability of claims

14

slide-31
SLIDE 31

Aviation and Banking?

http://www.sxc.hu/photo/206579 http://commons.wikimedia.org/wiki/Image:738100.jpg

  • Little defense against insiders
  • Failures are obvious
  • Complete audit logs
  • Transferability of claims

These are poor analogies.

14

slide-32
SLIDE 32

Open-Source?

15

slide-33
SLIDE 33

Software Independence [Rivest, Wack’06]

“A voting system is software independent if an undetected change or error in its software cannot cause an undetectable change or error in an election outcome”

16

slide-34
SLIDE 34

Examples

http://www.youtube.com/watch?v=zeHmsrLc4jc 17

slide-35
SLIDE 35

Examples

http://www.youtube.com/watch?v=zeHmsrLc4jc 17

slide-36
SLIDE 36

Non-example

18

slide-37
SLIDE 37

The Israeli Perspective

  • Nov ’07: Pilot of electronic voting with

touch screens in several municipalities.

  • Nov ’07: Minister of interior announces plan

to move to electronic elections

  • Apr ’08: TEHILA are given mandate to run

pilot in 3 municipalities.

  • Sep’08 - today: Legislation underway to

accommodate pilot.

19

slide-38
SLIDE 38

The process:

  • No public scrutiny
  • No open design

The result:

  • No paper trail
  • No software independence

20

slide-39
SLIDE 39

Why is Voting so Hard?

21

slide-40
SLIDE 40

The Point of An Election

“The People have spoken.... the bastards!”

Dick Tuck 1966 Concession Speech

22

slide-41
SLIDE 41

The Point of An Election

“The People have spoken.... the bastards!”

Dick Tuck 1966 Concession Speech

Provide enough evidence to convince the loser.

22

slide-42
SLIDE 42

http://www.cs.uiowa.edu/~jones/voting/pictures/ 23

slide-43
SLIDE 43

Secret Ballot vs. Verifiability

24

slide-44
SLIDE 44

Secret Ballot vs. Verifiability

Voting System

24

slide-45
SLIDE 45

Secret Ballot vs. Verifiability

Voting System Alice convince

24

slide-46
SLIDE 46

Secret Ballot vs. Verifiability

Voting System Alice convince

Carl the Coercer

24

slide-47
SLIDE 47

Secret Ballot vs. Verifiability

Voting System Alice convince

Carl the Coercer

24

slide-48
SLIDE 48

Desired Properties

(1)Alice verifies her vote. (2)Everyone verifies tallying. (3)Alice cannot be coerced by Eve.

25

slide-49
SLIDE 49

http://www.cs.uiowa.edu/~jones/voting/pictures/

1892 - Australian Ballot

26

slide-50
SLIDE 50

The Ballot Handoff

Alice the Voter

Sweet

27

slide-51
SLIDE 51

The Ballot Handoff

Alice the Voter

Sweet

27

slide-52
SLIDE 52

The Ballot Handoff

Alice the Voter

Sweet

27

slide-53
SLIDE 53

The Ballot Handoff

Alice the Voter

Sweet

27

slide-54
SLIDE 54

Salty Sweet Salty Sweet Sweet

The Ballot Handoff

Alice the Voter

Sweet

27

slide-55
SLIDE 55

Salty Sweet Salty Sweet Sweet

The Ballot Handoff

Alice the Voter

Sweet

Black Box

27

slide-56
SLIDE 56

Chain of Custody

28

slide-57
SLIDE 57

Chain of Custody

Vendor

/* * source * code */ if (...

1

28

slide-58
SLIDE 58

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1

28

slide-59
SLIDE 59

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3

28

slide-60
SLIDE 60

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3 4

Alice

28

slide-61
SLIDE 61

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3 4

Alice

28

slide-62
SLIDE 62

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3 Ballot Box Collection 5 4

Alice

28

slide-63
SLIDE 63

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3 Ballot Box Collection 5 Results ..... 6 4

Alice

28

slide-64
SLIDE 64

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3 Ballot Box Collection 5 Results ..... 6 4

Alice

This is where paper trail helps

28

slide-65
SLIDE 65

Chain of Custody

Voting Machine 2

Vendor

/* * source * code */ if (...

1 Polling Location 3 Ballot Box Collection 5 Results ..... 6 4

Alice

This is where paper trail helps Black box (even with paper trail)

28

slide-66
SLIDE 66

Threat Model

29

slide-67
SLIDE 67

Threat Model

Who is the attacker?

29

slide-68
SLIDE 68

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

29

slide-69
SLIDE 69

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

29

slide-70
SLIDE 70

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit?

29

slide-71
SLIDE 71

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit?

29

slide-72
SLIDE 72

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit? How will the attacks be carried out?

29

slide-73
SLIDE 73

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit? How will the attacks be carried out?

➡ corruption of input, ballot box, transport, tallying

29

slide-74
SLIDE 74

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit? How will the attacks be carried out?

➡ corruption of input, ballot box, transport, tallying ➡ coercion of voters

29

slide-75
SLIDE 75

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit? How will the attacks be carried out?

➡ corruption of input, ballot box, transport, tallying ➡ coercion of voters

Where will the attacks be hidden?

29

slide-76
SLIDE 76

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit? How will the attacks be carried out?

➡ corruption of input, ballot box, transport, tallying ➡ coercion of voters

Where will the attacks be hidden?

➡ honest mistakes: randomly distributed in the process

29

slide-77
SLIDE 77

Threat Model

Who is the attacker?

➡ administration officials, candidates, poll workers, even voters

What is the Benefit? How will the attacks be carried out?

➡ corruption of input, ballot box, transport, tallying ➡ coercion of voters

Where will the attacks be hidden?

➡ honest mistakes: randomly distributed in the process ➡ malicious intent: hiding where you least defend

29

slide-78
SLIDE 78

So what can we do?

30

slide-79
SLIDE 79

Wooten got the news from his wife, Roxanne, who went to City Hall on Wednesday to see the election results. “She saw my name with zero votes by it. She came home and asked me if I had voted for myself or not. I told her I did,” said Wooten, owner of local bar.

31

slide-80
SLIDE 80

Open audit elections

Cryptography provides more than confidentiality. Cryptography can provide both verifiability and ballot secrecy Anyone can audit!

32

slide-81
SLIDE 81

Bulletin Board

Public Ballots

Bridget: Sweet Carol: Salty

33

slide-82
SLIDE 82

Bulletin Board

Public Ballots

Bridget: Sweet Carol: Salty

Alice

33

slide-83
SLIDE 83

Bulletin Board

Public Ballots

Alice: Sweet Bridget: Sweet Carol: Salty

Alice

33

slide-84
SLIDE 84

Bulletin Board

Public Ballots

Alice: Sweet Bridget: Sweet Carol: Salty

Tally Sweet.......2 Salty..........1

Alice

33

slide-85
SLIDE 85

Encrypted Public Ballots

Bulletin Board

Alice: Rice Bridget: Clinton Carol: Rice

Tally Sweet.......2 Salty..........1

Alice

34

slide-86
SLIDE 86

Encrypted Public Ballots

Bulletin Board

Alice: Rice Bridget: Clinton Carol: Rice

Tally Sweet.......2 Salty..........1

Alice

Alice verifies her vote

34

slide-87
SLIDE 87

Encrypted Public Ballots

Bulletin Board

Alice: Rice Bridget: Clinton Carol: Rice

Tally Sweet.......2 Salty..........1

Alice

Alice verifies her vote Everyone verifies the tally

34

slide-88
SLIDE 88

Public-Key Encryption

35

slide-89
SLIDE 89

Public-Key Encryption

Keypair consists of a public key and a secret key .

sk pk

35

slide-90
SLIDE 90

Public-Key Encryption

Keypair consists of a public key and a secret key .

sk pk

"Salty" 8b5637

Encpk

35

slide-91
SLIDE 91

Public-Key Encryption

Keypair consists of a public key and a secret key .

sk pk

"Salty" 8b5637

Encpk

c5de34

Encpk

"Sweet"

35

slide-92
SLIDE 92

Public-Key Encryption

Keypair consists of a public key and a secret key .

sk pk

"Salty" 8b5637

Encpk

c5de34

Encpk

"Sweet" a4b395

Encpk

"Salty"

35

slide-93
SLIDE 93

Threshold Decryption

8b5637

Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.

36

slide-94
SLIDE 94

Threshold Decryption

8b5637 b739cb

Decsk1

Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.

36

slide-95
SLIDE 95

Threshold Decryption

8b5637 b739cb

Decsk1

261ad7

Decsk2

Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.

36

slide-96
SLIDE 96

Threshold Decryption

8b5637 b739cb

Decsk1

261ad7

Decsk2

7231bc

Decsk3

Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.

36

slide-97
SLIDE 97

Threshold Decryption

8b5637 b739cb

Decsk1

261ad7

Decsk2

7231bc

Decsk3

8239ba

Decsk4

Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.

36

slide-98
SLIDE 98

Threshold Decryption

8b5637 b739cb

Decsk1

261ad7

Decsk2

7231bc

Decsk3

8239ba

Decsk4

"Salty"

Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.

36

slide-99
SLIDE 99

Tallying Method I: Homomorphic Tabulation [Benaloh’87]

Enc(m1) × Enc(m2) = Enc(m1 + m2)

37

slide-100
SLIDE 100

Tallying Method I: Homomorphic Tabulation [Benaloh’87]

Yes = Enc(1) No = Enc(0) Enc(m1) × Enc(m2) = Enc(m1 + m2)

37

slide-101
SLIDE 101

Tallying Method I: Homomorphic Tabulation [Benaloh’87]

Yes = Enc(1) No = Enc(0)

Bulletin Board

Alice:

Bridget:

Carol:

Enc(ma) Enc(mb) Enc(mc)

Enc(m1) × Enc(m2) = Enc(m1 + m2)

37

slide-102
SLIDE 102

Tallying Method I: Homomorphic Tabulation [Benaloh’87]

Yes = Enc(1) No = Enc(0)

Bulletin Board

Alice:

Bridget:

Carol:

Enc(ma) Enc(mb) Enc(mc)

EncryptedTally = Enc(ma) × Enc(mb) × Enc(mc) = Enc(ma + mb + mc) Enc(m1) × Enc(m2) = Enc(m1 + m2)

37

slide-103
SLIDE 103

Tallying Method II: Mixnet [Chaum‘81]

Labor Likkud Supreme court

38

slide-104
SLIDE 104

Tallying Method II: Mixnet [Chaum‘81]

Labor Likkud Supreme court

Each mix server shuffles the encrypted votes.

38

slide-105
SLIDE 105

How can we verify

  • perations on

encrypted data?

39

slide-106
SLIDE 106

Verifying Validity of Encryption/Mixing

Given Enc(m) How can I verify:

  • 1. that it is not an encryption of more than one vote?
  • 2. that the encryption of my vote wasn’t “dropped”?

Zero-Knowledge proofs: Can prove validity of Enc(m) without revealing anything else! The crucial point: only need to verify that machine is computing right functionality...

40

slide-107
SLIDE 107

Verifying Validity of Encryption/Mixing

Given Enc(m) How can I verify:

  • 1. that it is not an encryption of more than one vote?
  • 2. that the encryption of my vote wasn’t “dropped”?

Zero-Knowledge proofs: Can prove validity of Enc(m) without revealing anything else! The crucial point: only need to verify that machine is computing right functionality...

40

slide-108
SLIDE 108

Voting Process Example

[Chaum’81, Sako-Kilian’95, Neff’04, Chaum’04, etc...]

41

slide-109
SLIDE 109

Alice

Identification

2

Polling station committee

42

slide-110
SLIDE 110

Alice

Identification

2

ID Polling station committee

42

slide-111
SLIDE 111

Alice

Identification

2

ID Ballot(s) Polling station committee

42

slide-112
SLIDE 112

The Ballot

Fold Tear

43

slide-113
SLIDE 113

Alice

+ Producing Encrypted Ballot

44

slide-114
SLIDE 114

Alice

+ Producing Encrypted Ballot

44

slide-115
SLIDE 115

Alice

+ Producing Encrypted Ballot

44

slide-116
SLIDE 116

Alice

+ Producing Encrypted Ballot

Sweet

44

slide-117
SLIDE 117

Encrypted Ballot

Sweet Sweet

45

slide-118
SLIDE 118

Ballot Casting

1

46

slide-119
SLIDE 119

Ballot Casting

1 2

46

slide-120
SLIDE 120

Ballot Casting

4

Alice

3 1 2

46

slide-121
SLIDE 121

Ballot Casting

4

Alice

3 1 2

Receipt

4

46

slide-122
SLIDE 122

Verifying Consistency [Benaloh]

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-123
SLIDE 123

Verifying Consistency [Benaloh]

Alice

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-124
SLIDE 124

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-125
SLIDE 125

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-126
SLIDE 126

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-127
SLIDE 127

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-128
SLIDE 128

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg 47

slide-129
SLIDE 129

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-130
SLIDE 130

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-131
SLIDE 131

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-132
SLIDE 132

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot

Alice

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-133
SLIDE 133

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot

Alice "CAST"

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-134
SLIDE 134

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot

Alice "CAST"

Signed Encrypted Ballot http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-135
SLIDE 135

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot

Alice "CAST"

Signed Encrypted Ballot

Alice

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-136
SLIDE 136

"AUDIT"

Verifying Consistency [Benaloh]

Alice "Vote for Sweet"

Encrypted Ballot

Alice

Decrypted Ballot

Alice "CAST"

Signed Encrypted Ballot

Alice

http://en.wikipedia.org/wiki/Image:Barcode-scanner.jpg Signed Encrypted Ballot Decrypted Ballot Encrypted Ballot VERIFICATION 47

slide-137
SLIDE 137

The Tallying Process

  • Paper tally
  • Electronic tally
  • 1. Homomorphic public-key encryption or mixnets
  • 2. Zero-knowledge proofs

48

slide-138
SLIDE 138

Putting It Together

Voting Equipment & Ballot Flow Verification 49

slide-139
SLIDE 139

Putting It Together

Voting Equipment & Ballot Flow Verification

Polling Location Voting Machine

Vendor

/* * source * code */ if (... 49

slide-140
SLIDE 140

Putting It Together

Voting Equipment & Ballot Flow Verification

Polling Location Voting Machine

Vendor

/* * source * code */ if (...

Public Ballot Box

Alice

49

slide-141
SLIDE 141

Putting It Together

Voting Equipment & Ballot Flow Verification

Polling Location Voting Machine

Vendor

/* * source * code */ if (...

Results ..... Public Ballot Box

Alice

49

slide-142
SLIDE 142

Putting It Together

Voting Equipment & Ballot Flow Verification

Polling Location Voting Machine

Vendor

/* * source * code */ if (...

Receipt 1 Results ..... Public Ballot Box

Alice

49

slide-143
SLIDE 143

Putting It Together

Voting Equipment & Ballot Flow Verification

Polling Location Voting Machine

Vendor

/* * source * code */ if (...

Receipt 1 2 Results ..... Public Ballot Box

Alice

49

slide-144
SLIDE 144

Open-Audit Elections

  • Alice verifies her vote.
  • Everyone verifies the tally.
  • Incoercibility is enforced.

50

slide-145
SLIDE 145

Open-Audit Elections

  • Alice verifies her vote.
  • Everyone verifies the tally.
  • Incoercibility is enforced.

Anyone can Audit.

50

slide-146
SLIDE 146

Open Audit Voting:Helios (Ben Adida, 2009)

51

slide-147
SLIDE 147

Open Audit Voting: Scantegrity II (Chaum et al., 2009)

52

slide-148
SLIDE 148

Questions?

53