on e vote integrity in the case of malicious voter
play

On E-Vote Integrity in the Case of Malicious Voter Computers Sven - PowerPoint PPT Presentation

Motivation Rage against the Machine Our Solution On E-Vote Integrity in the Case of Malicious Voter Computers Sven Heiberg Helger Lipmaa Filip Van Laenen Cybernetica AS, Estonia Computas AS, Norway September 21, 2010 Heiberg, Lipmaa, Van


  1. Motivation Rage against the Machine Our Solution On E-Vote Integrity in the Case of Malicious Voter Computers Sven Heiberg Helger Lipmaa Filip Van Laenen Cybernetica AS, Estonia Computas AS, Norway September 21, 2010 Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  2. Motivation Rage against the Machine Our Solution Outline I Motivation 1 Rage against the Machine 2 Our Solution 3 Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  3. Motivation Rage against the Machine Our Solution Motivation Internet voting: Everbody uses their own PCs to participate in state/local/. . . elections Accessibility++ Cost++ Security? Voting servers can be protected by organizational means and standard cryptography Voter PCs become the new security bottleneck Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  4. Motivation Rage against the Machine Our Solution On E-Voting Security Objectives: Correctness/integrity/robustness: every vote counts (once and correctly) Privacy: Not known how anyone votes Adversaries: Voting servers Internet This presentation: voter’s PC Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  5. Motivation Rage against the Machine Our Solution Practical Motivation We competed in a tender to organize nationwide Internet voting in Norway The client wanted to achieve security against malicious voter PCs under reasonable usability assumptions We showed that it is possible Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  6. Motivation Rage against the Machine Our Solution Privacy against Malicious Voter PC Original goal of our client Difficult to achieve without hurting usability For example, code voting: To vote, voter enters long random code, and to verify correctness, verifies another code For real Internet voting, too cumbersome, and too reliant on everyone getting the codes Usability is important! Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  7. Motivation Rage against the Machine Our Solution Integrity with Malicious PC Voters will be alerted on whether what they voted for reached the voting servers even in the presence of a malicious voter PC Without changing user experience much Trust model: threshold model is bad (independency of servers?) Goal #4: Efficiency? (Further adventures of the e-vote can be secured by using standard cryptographic means) Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  8. Motivation Rage against the Machine Our Solution Integrity with Malicious PC We need two extra channels to the voter Both must be independent of PC and trusted Independence is really needed since one can revote several times — PC could memorize check codes corresponding to earlier votes Possible coercion/family voting is the main reason implementation of e-voting has been delayed in several countries Channels are easy to implement At least in Norway Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  9. Motivation Rage against the Machine Our Solution E-voting Process Postchannel Messenger Voter PC Vote Collector Tallier Prechannel Registration Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  10. Motivation Rage against the Machine Our Solution E-voting Process — Reality Postchannel Messenger Voter PC Vote Collector Tallier Prechannel Registration Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  11. Motivation Rage against the Machine Our Solution Basic Idea 5 “You voted at xx:xx:xx for Codev [ c ] ” Postchannel Messenger 4 EncM ( Codev [ c ]) 2 Candidate c Voter PC Vote Collector Tallier 3 EncM ( c ) , EncT ( c ) 6 All values EncT ( c ) ZK proof of correctness Prechannel All signed by PC 1 Candidate list with integrity check codes Codev [ c ] Registration Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  12. Motivation Rage against the Machine Our Solution Assumptions behind Our Solution Statewise PKI for signing/verification keys check, going to be implemented in parallel . . . although latest news are not so positive anymore . . . Minimal PKI to distribute the public encryption keys of voting servers check, easy to implement if you have signing/verification keys Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  13. Motivation Rage against the Machine Our Solution Assumptions behind Our Solution Prechannel to distribute check codes to voters (mostly) check, all Norwegians get a voter registration notification on paper anyways Extra server (messenger) to notify noters of the success of their actions— check, one extra computer is cheap Postchannel between messenger and voters— (mostly) check, can use SMS etc Efficient, easily understandable cryptography— ??? Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  14. Motivation Rage against the Machine Our Solution Cryptographic Protocol: In A Nutshell PC sends Enc M ( c ) to vote collector, vote collector applies proxy oblivious transfer to obtain Enc M ( Code v [ c ]) Fairly simple, but costly to implement — VC has to do 2 · ♯ candidates exponentiations PC proves correctness of its actions ZK proof that Enc M ( c ) and Enc T ( c ) “encrypt” to the same valid candidate c ZK proof looks complex but is in fact much more efficient than POT Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  15. Motivation Rage against the Machine Our Solution Proxy Oblivious Transfer: Definition Chooser has an index x ∈ { 0 , . . . , n − 1 } , sender has a database f = ( f 0 , . . . , f n − 1 ) Functionality: Proxy obtains f x Privacy: chooser gets no new information, sender obtains nothing about x , proxy only obtains f x (and no x )! In our case, f is the list of codes, x is the concrete candidate, proxy obtains f x = Code v [ c ] Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  16. Motivation Rage against the Machine Our Solution Current Status We have a mock-up implementation Sandbox (unoptimized) implementation ready One vote collector processes ≈ 3000 votes per hour at 80 candidates In recent Estonian elections, there were ≈ 4500 e-votes in the peak hour (usually much less) Considered step: implementation by using a Hardware Security Module — 10 + times speedup Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  17. Motivation Rage against the Machine Our Solution Current Status Norwegian government’s representative at NordSec 2009 in Oslo was using slides inspired by our solution Prechannel, postchannel, . . . The setting is going to be used The final Norwegian protocol is faster but not as secure Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

  18. Motivation Rage against the Machine Our Solution Questions? Full version at http://eprint.iacr.org/2010/195 Further work: we do have more efficient yet secure solutions (not published yet) > 50 000 votes per hour Heiberg, Lipmaa, Van Laenen E-Vote Integrity with Malicious Voter Computers

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend