cryptographic voting
play

Cryptographic Voting David Bernhard University of Bristol David - PowerPoint PPT Presentation

Cryptographic Voting David Bernhard University of Bristol David Bernhard 1 / 49 Voting David Bernhard 2 / 49 Voting Verifiability Privacy David Bernhard 3 / 49 Dimensions T ype: preference, instant run-off, approval, range, ...


  1. Cryptographic Voting David Bernhard University of Bristol David Bernhard 1 / 49

  2. Voting David Bernhard 2 / 49

  3. Voting Verifiability Privacy David Bernhard 3 / 49

  4. Dimensions T ype: preference, instant run-off, approval, range, ... System: paper, machine, online, ... Properties: privacy, verifiability, ... David Bernhard 4 / 49

  5. Dimensions T ype: preference, instant run-off, approval, range, ... Cryptographic Voting System: paper, ≠ machine, online, ... "online voting" Properties: privacy, verifiability, ... David Bernhard 5 / 49

  6. Scantegrity David Bernhard 6 / 49

  7. Dimensions T ype: preference, instant run-off, approval, range, ... System: paper, machine, online, ... Properties: privacy, verifiability, ... David Bernhard 7 / 49

  8. Election Properties (I) Only eligible voters should be able to vote, and only once each, and only for permitted choices. The vote cast by each voter should be the one she intended to cast. The announced result should correspond to the votes actually cast. David Bernhard 8 / 49

  9. Bulletin Boards John Hancock YES John Adams YES Benjamin Franklin YES John Penn YES Thomas Jefferson YES David Bernhard 9 / 49

  10. Bulletin Boards Bulletin Board: contains public data posted by voters. David Bernhard 10 / 49

  11. Verifiability Verifiability: I can observe that an election was tallied correctly. Systems: Bulletin board, show of hands. David Bernhard 11 / 49

  12. Election Properties (II) I do not want anyone to know how I voted. I do want to know how my representatives voted. David Bernhard 12 / 49

  13. Election Properties (II) I do not want anyone to know how I voted. I do want to know how my representatives voted. Voters should not be bribed or intimidated into voting a certain way. David Bernhard 13 / 49

  14. Privacy Privacy (secret ballot): no-one can tell how I voted. Coercion-resistance: I cannot prove to someone how I voted. Systems: voting booth, ballot box, ... David Bernhard 14 / 49

  15. Privacy Coercion resistance Verifiability Privacy Secret ballot Bulletin board, public ballot David Bernhard 15 / 49

  16. Trust Secret ballot: trust election officials? Trust voting machines? David Bernhard 16 / 49

  17. Ok ... so what is cryptographic voting, then? David Bernhard 17 / 49

  18. Cryptographic Voting Privacy + Verifiability David Bernhard 18 / 49

  19. Cryptographic Voting Publicly verifiable secret- ballot elections. Easier to verify and trust than current "voting machines". David Bernhard 19 / 49

  20. Helios ● IACR board ● President of UC Louvain ● Princeton University Student Government David Bernhard 20 / 49

  21. Cryptographic Voting Step 1: Bring back the bulletin board. David Bernhard 21 / 49

  22. Voting Step 2: Place encrypted votes on the board. David Bernhard 22 / 49

  23. Voting Casting Preparation David Bernhard 23 / 49

  24. Auditing Ballots cast open David Bernhard 24 / 49

  25. Voting Voters can keep a copy of their ballot and check that it appears on the final board. David Bernhard 25 / 49

  26. T allying Step 3: T ally the election. David Bernhard 26 / 49

  27. T allying hard easy David Bernhard 27 / 49

  28. Verifiable Computation public result secret proof David Bernhard 28 / 49

  29. Privacy All but one administrator compromised: Still cannot decrypt individual ballots. David Bernhard 29 / 49

  30. Verifiability Even if all administrators are compromised: Still cannot claim an incorrect result. David Bernhard 30 / 49

  31. T allying Administrators facilitate rather than carry out tallying . T allying is verifiable. Trust assumptions are very different to "vote counters" in pen-on-paper elections. David Bernhard 31 / 49

  32. Is it secure? David Bernhard 32 / 49

  33. My Work Security model: abstraction of real world that can be analysed mathematically. Security proof/argument: shows that an abstraction of a voting system meets an abstract model. David Bernhard 33 / 49

  34. Proofs? (My personal opinion) A security argument is like a safety certificate: it shows that a cryptographic system conforms to certain standards or "best practice". This does not prove that a system cannot fail. It gives assurance that risks of some types of failure have been mitigated. David Bernhard 34 / 49

  35. Helios Used in practice but no security argument – I tried to provide one. Cortier/Smyth: possible privacy compromise under certain circumstances. Some details of Helios were interfering with my attempt at a security argument ... David Bernhard 35 / 49

  36. Bad Ballots I can create "bad" ballots that erase a tally in an election. Don't try this at home – I can detect such ballots, too. David Bernhard 36 / 49

  37. Bad Ballots Sample election with votes: Yes 2 No 0 Maybe 1 Bad ballot cast for "yes". David Bernhard 37 / 49

  38. Bad Ballots Sample election with votes: Yes 2 No 0 Maybe 1 Bad ballot cast for "yes". David Bernhard 38 / 49

  39. Bad Ballots Sample None election with = votes: "null" Yes 2 = No 0 Something has Maybe 1 gone very, very wrong Bad ballot cast for "yes". David Bernhard 39 / 49

  40. Verifiability If all administrators are compromised: The election result can be tampered with. This attack is undetectable. David Bernhard 40 / 49

  41. Consequences Helios is easy to fix (the next version will be patched based on our work). Paper at Asiacrypt 2012. Cryptographic theory is relevant for practice. David Bernhard 41 / 49

  42. So why aren't we using crypto-voting yet? David Bernhard 42 / 49

  43. Quick Recap I am trying to sell you an idea, not a product. Cryptographic voting can offer both privacy and verifiability. Verifiability makes a system easier to trust. David Bernhard 43 / 49

  44. Coercion? Election fraud, coercion and bribery are real problems – and need to be addressed in any "practical" system. Helios is designed for low-coercion environments only. Vote privacy is mostly just a step towards coercion- resistance. David Bernhard 44 / 49

  45. Challenges What is the single, most important property a voting system should possess? David Bernhard 45 / 49

  46. Challenges What is the single, most important property a voting system should possess? Simplicity. David Bernhard 46 / 49

  47. Challenges Usability Understanding Trust David Bernhard 47 / 49

  48. The Future Where do we go from here? Prediction: The next steps from here to a widely deployed system will probably have very little to do with cryptography . David Bernhard 48 / 49

  49. Thank you This presentation uses images published under the creative commons/attribution licence. David Bernhard 49 / 49

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend