Cryptography and Voting
Ben Adida Harvard University EVT & WOTE August 11th, 2009 Montreal, Canada
Cryptography and Voting Ben Adida Harvard University EVT & - - PowerPoint PPT Presentation
Cryptography and Voting Ben Adida Harvard University EVT & WOTE August 11th, 2009 Montreal, Canada If you think cryptography is the solution to your problem.... 2 ... then you dont understand cryptography... 3 ... then you
Ben Adida Harvard University EVT & WOTE August 11th, 2009 Montreal, Canada
2
3
3
4
5
6
7
8
Wooten got the news from his wife, Roxanne, who went to City Hall on Wednesday to see the election results. "She saw my name with zero votes by it. She came home and asked me if I had voted for myself or not."
9
10
11
12
13
➡ pilots vs. passengers (airline is on your side, I think.) ➡ banking privacy is only voluntary:
you are not the enemy.
➡ plane crashes & statements vs. 2% election fraud ➡ Full banking receipts vs. destroying election evidence
➡ a bank where you never get a receipt. ➡ an airline where the pilot is working against you.
14
http://www.cs.uiowa.edu/~jones/voting/pictures/
15
16
Vendor
/* * source * code */ if (...
1
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1 Polling Location 3
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1 Polling Location 3 4
Alice
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1 Polling Location 3 4
Alice
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1 Polling Location 3 Ballot Box Collection 5 4
Alice
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1 Polling Location 3 Ballot Box Collection 5 Results ..... 6 4
Alice
16
Voting Machine 2
Vendor
/* * source * code */ if (...
1 Polling Location 3 Ballot Box Collection 5 Results ..... 6 4
Alice
Black Box
16
18
19
20
Bulletin Board
Bob: McCain Carol: Obama
21
Bulletin Board
Bob: McCain Carol: Obama
Alice
21
Bulletin Board
Alice: Obama Bob: McCain Carol: Obama
Alice
21
Bulletin Board
Alice: Obama Bob: McCain Carol: Obama
Tally Obama....2 McCain.... 1
Alice
21
Bulletin Board
Alice: Rice Bob: Clinton Carol: Rice
Tally Obama....2 McCain.... 1
Alice
22
Bulletin Board
Alice: Rice Bob: Clinton Carol: Rice
Tally Obama....2 McCain.... 1
Alice
Alice verifies her vote
22
Bulletin Board
Alice: Rice Bob: Clinton Carol: Rice
Tally Obama....2 McCain.... 1
Alice
Alice verifies her vote Everyone verifies the tally
22
Polling Location Voting Machine
Vendor
/* * source * code */ if (...
Polling Location Voting Machine
Vendor
/* * source * code */ if (...
Ballot Box / Bulletin Board
Alice
Polling Location Voting Machine
Vendor
/* * source * code */ if (...
Ballot Box / Bulletin Board
Alice
Results .....
Polling Location Voting Machine
Vendor
/* * source * code */ if (...
Receipt 1 Ballot Box / Bulletin Board
Alice
Results .....
Polling Location Voting Machine
Vendor
/* * source * code */ if (...
Receipt 1 2 Ballot Box / Bulletin Board
Alice
Results .....
24
25
26
27
28
Keypair consists of a public key and a secret key .
sk pk
28
Keypair consists of a public key and a secret key .
sk pk
"Obama" 8b5637
Encpk
28
Keypair consists of a public key and a secret key .
sk pk
"Obama" 8b5637
Encpk
c5de34
Encpk
"McCain"
28
Keypair consists of a public key and a secret key .
sk pk
"Obama" 8b5637
Encpk
c5de34
Encpk
"McCain"
a4b395
Encpk
"Obama"
28
8b5637
Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.
29
8b5637 b739cb
Decsk1
Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.
29
8b5637 b739cb
Decsk1
261ad7
Decsk2
Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.
29
8b5637 b739cb
Decsk1
261ad7
Decsk2
7231bc
Decsk3
Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.
29
8b5637 b739cb
Decsk1
261ad7
Decsk2
7231bc
Decsk3
8239ba
Decsk4
Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.
29
8b5637 b739cb
Decsk1
261ad7
Decsk2
7231bc
Decsk3
8239ba
Decsk4
Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt.
"Obama"
29
30
30
Enc(m1) × Enc(m2) = Enc(m1 + m2)
30
Enc(m1) × Enc(m2) = Enc(m1 + m2)
30
Enc(m1) × Enc(m2) = Enc(m1 + m2)
30
then we can simply add “under cover” of encryption! Enc(m1) × Enc(m2) = Enc(m1 + m2)
31
Each mix server “unwraps” a layer of this encryption onion.
32
33
Vote For: Obama
President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse
Vote For: Obama
33
This last envelope likely contains “Obama”
Vote For: Obama
President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse
Vote For: Obama
33
Open envelopes don’t prove anything after the fact.
President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse
Vote For: Obama
President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse
Vote For: Paul
34
McCain
35
Voter interacts with a voting machine Obtains a freshly printed receipt that displays the encrypted ballot Takes the receipt home and uses it as a tracking number. Receipts posted for public tally.
Alice Voting Machine
Encrypted Vote
36
Pre-print paper ballots with some indirection betw candidate and choice Break the indirection (tear, detach) for effective encryption Take receipt home and use it as tracking number. Receipts posted for public tally.
q r m x Adam - x Bob - q Charlie - r David - m q r m x
8c3sw
Adam - x Bob - q Charlie - r David - m
8c3sw
q r m x
8c3sw
8c3sw
David Adam Bob Charlie _______ _______ _______ _______ David Adam Bob Charlie _______ _______ _______ _______
8c3sw
37
38
38
Alice
38
Alice "Obama"
38
Alice
Encrypted Ballot
"Obama"
38
Alice
Encrypted Ballot
Alice "Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice "Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot
Alice
Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot
Alice "CAST"
Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot
Alice "CAST"
Signed Encrypted Ballot Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot
Alice "CAST"
Signed Encrypted Ballot
Alice
Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
38
"AUDIT" Alice
Encrypted Ballot
Alice
Decrypted Ballot
Alice "CAST"
Signed Encrypted Ballot
Alice
Signed Encrypted Ballot Decrypted Ballot Encrypted Ballot VERIFICATION
"Obama"
➡ high-assurance, human-verifiable, proofs of correct encryption
➡ closely mirrors opscan voting
➡ teaching the concept of open-audit without deep crypto
➡ handling complex election styles
➡ elegant, simple, paper-based
39
40
41
42
43
44
Ed Felten: “you have no voter privacy, deal with it.”
44
Ed Felten: “you have no voter privacy, deal with it.”
45