electronic voting
play

Electronic Voting Electronic voting at a precinct Analysis of an - PDF document

Electronic Voting Electronic voting at a precinct Analysis of an Internet Voting Focus is on preventing fraud on the part of Protocol people building and running system. Electronic voting over the internet Dale Neal Must


  1. Electronic Voting • Electronic voting at a precinct Analysis of an Internet Voting – Focus is on preventing fraud on the part of Protocol people building and running system. • Electronic voting over the internet Dale Neal – Must prevent fraud for all parties Garrett Smith – Must provide anonymity for voters Our chosen protocol Building Blocks • An Anonymous Electronic Voting Protocol • Public Key Cryptography for Voting Over The Internet • Hard-to-invert permutations • Indrajit Ray, Indrakshi Ray, Natarajan • Blind Signatures on mesages Narasimhamurthi • University of Michigan • Most research on internet voting focuses on new cryptographic primitives. – Not interesting to model at a protocol layer. Notation Protocol Overview • V e – V’s encryption key Certification Ballot Distributor Vote Counter • V d – V’s decryption key (signing key) Authority • [x, V d ] – x encrypted with V d • h(x) – hash of x • {} – grouping • x * [b, V e ] – blinded submission of x for signature by V • [{x * [b, V e ]}, V d ] – V’s blind signature of Voter Voter Imposter x, can be converted to [x, V d ] knowing b. 1

  2. Pre-protocol setup Blank Ballot Distribution Certification Ballot Distributor Vote Counter Registration Authority Authority Voters register and are issued a certificate with public key and identity. [{y, [h(y), BD d ]}, V e ] y – ballot serial number Voter Voter Imposter Voter Generate a voter mark Voter Certification (part a) Certification Ballot Distributor Vote Counter • Voter mark allows voter to identify their Authority ballot without letting others identify their ballot. • Generated by a one-way permutation of the [{m * [r,CA e ], [h(m*[r,CA e ]), V d ], V}, CA e ] serial number. • Poorly described in the paper y – serial number – We assume they meant a keyed hash. Voter m – voter mark r – blinding factor Voter Certification (part b) Vote Casting Certification Certification Ballot Distributor Vote Counter Ballot Distributor Vote Counter Authority Authority [[{m * [r,CA e ]}, CA d ], V e ] [{vote, [m, CA d ]}, VC e ] y – serial number Note: Abstracted away m – voter mark Voter Voter public FTP server m – voter mark intermediary r – blinding factor 2

  3. Publishing Attack Model Certification Ballot Distributor Vote Counter • Any of CA, BD, VC could collude among Authority themselves and with any voters. – Only colluding voters votes should be affected {m1 * [r,CA e ], {vote1, [m1, CA d ]} y1 [h(m1*[r,CA e ]), V1 d ]} • If fraud occurs, the fraud can be proved {vote2, [m2, CA d ]} y2 {m2 * [r,CA e ], {vote3, [m3, CA d ]} y3 [h(m2*[r,CA e ]), V2 d ]} {m3 * [r,CA e ], [h(m3*[r,CA e ]), V3 d ]} Claimed Properties Modeling in Murphi • Only eligible voters are able to cast votes • Encryption, signatures modeled same as in • A voter is able to cast only one vote Needham-Schroeder with AgentId • A voter is able to verify that his or her vote is • Serial number, voter mark, blind signatures counted in the final tally modeled in the same way. • Nobody other than the voter can link a cast vote • Registered and unregistered voters with a voter • BD, CA, VC can all act fraudulently, and • If a voter decides not to vote, nobody is able to accept invalid data cast a fraudulent vote in place of the voter. Invariants invariant "voter can prove fraud if their vote is uncounted" forall i: GoodVoterId do forall j: VCId do • Different type of invariant than for voter[i].state = V_VOTED & Needham-Schroeder and other multisetcount (l:vc[j].votes, authentication protocols. vc[j].votes[l].signedMark = voter[i].signedMark) = 0 • Of the type: if there is fraud, can a party -> detect it? ismember(voter[i].ballotSigner, BDId) & ismember(voter[i].markSigner, CAId) end end; 3

  4. invariant "voter cannot claim fraud when they don’t vote" Invariant is violated forall i: GoodVoterId do forall j: VCId do voter[i].state != V_VOTED & • After Voter Certification voter has: multisetcount(l:vc[j].votes, – Serial number signed by BD vc[j].votes[l].signedMark = voter[i].signedMark & – Voter mark signed by CA vc[j].votes[l].vote = true) = 0 • VC cannot demonstrate it never received vote as opposed to VC discarding the vote. -> !(ismember(voter[i].ballotSigner, BDId) & • Since any voter can demonstrate fraud even if none exists, demonstrations of fraud have ismember(voter[i].markSigner, CAId)) no meaning. end end; invariant "a fraudulent vote can be detected" forall i: VCId do Detecting know flaws forall j: CAId do multisetcount(l:vc[i].votes, • We were able to construct an invariant to vc[i].votes[l].vote = false) > 0 detect a flaw discussed in the paper: -> If a voter completes Voter Certification, but multisetcount(l:vc[i].votes, true) > does not vote the three agents can collude multisetcount(m:ca[j].certifications, to cast a fraudulent vote in that voters ca[j].certifications[m].response) place. -- if there is a fraudulent vote, there must -- be more votes than published certified voters. end end; Deficiencies we couldn’t model Benefits of modeling • Ballot distribution seems unnecessary • Ambiguities in the protocol description – Voter chooses nonce were cleared up by modeling the protocol – CA keeps track of which voters have submitted nonces and figuring out what had to be provided to for blind signature and only signs one nonce per registered voter ensure desired properties • Encrypting traffic makes it harder for bystanders to eavesdrop, but doesn't provide any extra guarantees because even with CA, BD, and VC colluding they can’t determine who cast what vote. 4

  5. Conclusions • Being able to demonstrate fraud when there is none is a fatal flaw. • Murphi is not well suited to modeling this flavor of protocol. – All of the flaws we found were discovered while trying to model the protocol – Proof oriented analysis seems to be a better fit • Prove for each type of fraud, that if it happens, then an honest party can prove that it happened 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend