masked ballot voting for receipt free online elections
play

Masked Ballot Voting for Receipt-Free Online Elections Roland Wen - PowerPoint PPT Presentation

Masked Ballot Voting for Receipt-Free Online Elections Roland Wen and Richard Buckland School of Computer Science and Engineering The University of New South Wales Sydney, Australia {rolandw,richardb}@cse.unsw.edu.au VOTE-ID 2009 1 / 35


  1. Masked Ballot Voting for Receipt-Free Online Elections Roland Wen and Richard Buckland School of Computer Science and Engineering The University of New South Wales Sydney, Australia {rolandw,richardb}@cse.unsw.edu.au VOTE-ID 2009 1 / 35

  2. Outline Background Receipt-Freeness Designing Receipt-Free Schemes Masked Ballot Voting Scheme Overview Voting Scheme Discussion 2 / 35

  3. Background Receipt-Freeness Receipt-Freeness in Online Elections ◮ Online elections have great potential but serious concerns remain ◮ Elections have unique and challenging security requirements ◮ Secret ballot prevents bribery and coercion ◮ ⇒ Voters can lie to 3rd parties ◮ Receipt-freeness: voters cannot prove how they voted ◮ No receipt (evidence) for the vote 3 / 35

  4. Background Receipt-Freeness Why Is Receipt-Freeness Difficult? 1. Electronic data is easy to copy ◮ ⇒ Easy to produce electronic evidence for the vote 2. Plausible there could be a powerful adversary who intercepts all Internet communication (eg packet sniffing by ISPs) ◮ ⇒ Verify evidence ◮ Need secret information that prevents adversary from verifying evidence ◮ ⇒ Strong assumptions during the election ◮ Hard to realise assumptions in practice 4 / 35

  5. Background Designing Receipt-Free Schemes Example: A Flawed Scheme ◮ Hypothetical voting scheme: voters and authorities only communicate via the Internet 5 / 35

  6. Background Designing Receipt-Free Schemes Example: A Flawed Scheme ◮ Hypothetical voting scheme: voters and authorities only communicate via the Internet VOTER Internet vote 42 ballot E 1337 random Gromit casts AUTHORITIES 20 1337 6 / 35

  7. Background Designing Receipt-Free Schemes Example: A Flawed Scheme ◮ Hypothetical voting scheme: voters and authorities only communicate via the Internet VOTER Internet vote 42 ballot E 1337 random Gromit casts AUTHORITIES 20 1337 ADVERSARY 7 / 35

  8. Background Designing Receipt-Free Schemes Example: A Flawed Scheme ◮ Hypothetical voting scheme: voters and authorities only communicate via the Internet VOTER Internet vote 42 ballot E 1337 random Gromit casts AUTHORITIES 20 1337 vote 41 random 19 ADVERSARY You lying dog! Gotcha! vote 41 ballot E 9009 random ≠ 1337 19 8 / 35

  9. Background Designing Receipt-Free Schemes 1. Untappable Channels Approach ◮ Untappable channels: adversary cannot intercept messages 9 / 35

  10. Background Designing Receipt-Free Schemes 1. Untappable Channels Approach ◮ Untappable channels: adversary cannot intercept messages AUTHORITIES Untappable channel 42 1337 vote ? ballot 41 9009 ... ... VOTER vote ? ballot 10 / 35

  11. Background Designing Receipt-Free Schemes 1. Untappable Channels Approach ◮ Untappable channels: adversary cannot intercept messages AUTHORITIES Untappable channel 42 1337 vote ? ballot 41 9009 ... ... VOTER vote ? ballot Internet vote ballot ? 42 1337 Gromit casts 1337 AUTHORITIES 11 / 35

  12. Background Designing Receipt-Free Schemes 1. Untappable Channels Approach ◮ Untappable channels: adversary cannot intercept messages AUTHORITIES Untappable channel 42 1337 vote ? ballot 41 9009 ... ... VOTER vote ? ballot Internet vote ballot ? 42 1337 Gromit casts 1337 AUTHORITIES vote 41 Gromit 1337 vote ?? ballot Is this the ADVERSARY real table? ...I'm stuffed! vote ballot ?? 41 1337? 12 / 35

  13. Background Designing Receipt-Free Schemes Problems with Untappable Channels ◮ Difficult to implement in practice ◮ Internet susceptible to eavesdropping by well-funded adversary ◮ Resolving disputes ◮ If voter claims authority is dishonest during the election, who is lying? ◮ Distributing trust among multiple authorities ◮ Voter must know identity of at least one trusted authority to lie safely ◮ Voter will be caught out if lying about messages from a corrupt authority ◮ ⇒ Typically have to assume no authorities collude with the adversary to bribe or coerce voters 13 / 35

  14. Background Designing Receipt-Free Schemes 2. Anonymous Channels Approach ◮ Anonymous channels: adversary cannot identify senders 14 / 35

  15. Background Designing Receipt-Free Schemes 2. Anonymous Channels Approach ◮ Anonymous channels: adversary cannot identify senders Untappable channel REGISTRAR VOTER Gromit is 86 15 / 35

  16. Background Designing Receipt-Free Schemes 2. Anonymous Channels Approach ◮ Anonymous channels: adversary cannot identify senders Untappable channel REGISTRAR VOTER Gromit is 86 vote 42 ballot Election start E 1337 random Anonymous channel 20 AUTHORITIES 86 casts 1337 16 / 35

  17. Background Designing Receipt-Free Schemes 2. Anonymous Channels Approach ◮ Anonymous channels: adversary cannot identify senders Untappable channel REGISTRAR VOTER Gromit is 86 vote 42 ballot Election start E 1337 random Anonymous channel 20 99 casts vote AUTHORITIES 9009 41 86 casts ballot E 1337 9009 random 19 17 / 35

  18. Background Designing Receipt-Free Schemes 2. Anonymous Channels Approach ◮ Anonymous channels: adversary cannot identify senders Untappable channel REGISTRAR VOTER Gromit is 86 vote 42 ballot Election start E 1337 random Anonymous channel 20 99 casts vote AUTHORITIES 9009 41 86 casts ballot E 1337 9009 random 19 I am 99 Who are vote 86 and 99? 41 random 19 ADVERSARY Is Gromit really 99? vote ...I'm stuffed! 41 ballot E 9009 random 19 18 / 35

  19. Background Designing Receipt-Free Schemes Problems with Anonymous Channels ◮ Difficult to implement in practice ◮ Hard to guarantee anonymity over Internet ◮ Eg mix-nets still require untappable channels between voters and mix-net ◮ Problems remain with offline untappable channels ◮ Resolving disputes ◮ Distributing trust 19 / 35

  20. Background Designing Receipt-Free Schemes 3. Trusted Randomisers Approach ◮ Trusted randomisers: generate secret randomness 20 / 35

  21. Background Designing Receipt-Free Schemes 3. Trusted Randomisers Approach ◮ Trusted randomisers: generate secret randomness VOTER vote 42 ballot E 1337 Untappable channel random 20 RANDOMISER 21 / 35

  22. Background Designing Receipt-Free Schemes 3. Trusted Randomisers Approach ◮ Trusted randomisers: generate secret randomness VOTER Internet vote 42 ballot E 1337 Gromit casts AUTHORITIES 1337 Untappable channel random 20 RANDOMISER 22 / 35

  23. Background Designing Receipt-Free Schemes 3. Trusted Randomisers Approach ◮ Trusted randomisers: generate secret randomness VOTER Internet vote 42 ballot E 1337 Gromit casts AUTHORITIES 1337 Untappable channel random 20 RANDOMISER vote 41 What is the random value? ADVERSARY ...I'm stuffed! vote 41 ballot E ? random ? 23 / 35

  24. Background Designing Receipt-Free Schemes Problems with Trusted Randomisers ◮ A lot of trust involved ◮ Hard to guarantee local channel is untappable ◮ Smart cards are tamper-resistant not tamper-proof ◮ Single point of failure 24 / 35

  25. Masked Ballot Voting Scheme Masked Ballot Voting Scheme Background Receipt-Freeness Designing Receipt-Free Schemes Masked Ballot Voting Scheme Overview Voting Scheme Discussion 25 / 35

  26. Masked Ballot Voting Scheme Overview Approach ◮ How to avoid strong assumptions during the election? ◮ Voters and authorities can only communicate via the Internet ◮ Adversary can intercept all messages ◮ ⇒ Voter must construct ballot without any assistance during the election ◮ ⇒ Adversary can verify the voter’s private data against eavesdropped ballot ◮ ⇒ Private data must appear to correspond with any possible vote ◮ How does a voter indicate the actual vote? ◮ Vote must depend on secret information obtained before the election 26 / 35

  27. Masked Ballot Voting Scheme Overview Masked Ballot Voting ◮ Assumption: untappable channels available only before the election (offline registration stage) ◮ All communication during the election is posted to authenticated bulletin board via Internet ◮ Purely a voting scheme ◮ The output is an encrypted vote for each voter ◮ Generic: independent of the vote encoding ◮ Subsequent counting scheme calculates the result 27 / 35

  28. Masked Ballot Voting Scheme Voting Scheme Registration Stage Untappable channel REGISTRAR mask VOTER 11 ◮ A registrar provides each voter V with a secret mask 1. Randomly select a mask m 2. Encrypt m → � m � 3. Post ( V , � m � ) to bulletin board 4. Construct designated-verifier proof d that � m � is an encryption of m 5. Send ( m , d ) to V via an untappable channel 28 / 35

  29. Masked Ballot Voting Scheme Voting Scheme Voting Stage Untappable channel REGISTRAR mask VOTER 11 vote 42 – 31 Election start mask Internet 11 ballot E 1337 random Gromit casts AUTHORITIES 20 1337 ◮ A voter casts a masked ballot for a vote v using mask m 1. Encrypt ( v − m ) → � v − m � 2. Construct proof p of plaintext knowledge 3. Post ( � v − m � , p ) to the bulletin board via the Internet 29 / 35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend