scratch vote
play

Scratch & Vote : Self-Contained Paper-Based Cryptographic - PowerPoint PPT Presentation

Scratch & Vote : Self-Contained Paper-Based Cryptographic Voting Ben Adida Ronald L. Rivest 30 October 2006 The Next Harvard Pres! Chain of Custody Chain of Custody 1 /* * source * code */ if (... Vendor Chain of Custody 1 /* *


  1. Scratch & Vote : Self-Contained Paper-Based Cryptographic Voting Ben Adida Ronald L. Rivest 30 October 2006

  2. The Next Harvard Pres!

  3. Chain of Custody

  4. Chain of Custody 1 /* * source * code */ if (... Vendor

  5. Chain of Custody 1 /* * source * code Voting */ 2 Machine if (... Vendor

  6. Chain of Custody 1 /* * source * code Polling Voting */ 3 2 Location Machine if (... Vendor

  7. Chain of Custody 1 /* * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice

  8. Chain of Custody 1 /* * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice

  9. Chain of Custody 1 /* * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice 5 Ballot Box Collection

  10. Chain of Custody 1 /* * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice Results 5 6 ..... Ballot Box Collection

  11. Chain of Custody 1 /* * source * code Polling Voting */ 3 2 Location Machine if (... Vendor VVPAT 4 Alice Results 5 6 ..... Ballot Box Collection

  12. End-to-End

  13. End-to-End /* * source * code Voting */ Machine if (... Vendor Polling Location

  14. End-to-End /* * source * code Voting */ Machine if (... Vendor Ballot Box / Bulletin Board Polling Location Alice

  15. End-to-End /* * source * code Voting */ Machine if (... Vendor Results Ballot Box / Bulletin Board Polling ..... Location Alice

  16. End-to-End /* * source * code Voting */ Machine if (... Vendor Results Ballot Box / Bulletin Board Polling ..... Location 1 Alice Receipt

  17. End-to-End /* * source * code Voting */ Machine if (... Vendor Results Ballot Box / Bulletin Board Polling ..... Location 1 2 Alice Receipt

  18. Cryptographic Voting End-to-End /* * source * code Voting */ Machine if (... Vendor Results Ballot Box / Bulletin Board Polling ..... Location 1 2 Alice Receipt

  19. Cryptographic Voting Open-Audit Voting End-to-End /* * source * code Voting */ Machine if (... Vendor Results Ballot Box / Bulletin Board Polling ..... Location 1 2 Alice Receipt

  20. Properties of OAV (1) Alice verifies her vote . (2) Everyone verifies tallying . (3) Alice cannot be coerced by Eve.

  21. A Bulletin Board Bulletin Board Bridget : Clinton Carol : Rice

  22. A Bulletin Board Bulletin Board Bridget : Clinton Carol : Rice Alice

  23. A Bulletin Board Bulletin Board Alice : Bridget : Rice Clinton Carol : Rice Alice

  24. A Bulletin Board Bulletin Board Alice : Bridget : Rice Clinton Carol : Rice Tally Rice.........2 Clinton...1 Alice

  25. An Encrypted Bulletin Board Bulletin Board Alice : Bridget : Rice Clinton Carol : Rice Tally Rice.........2 Clinton...1 Alice

  26. Verification Ballot Data Flow

  27. Alice Encrypted encryption Votes Bridget Verification Ballot Data Flow

  28. Alice Encrypted encryption Votes Bridget Verification Ballot Data Flow

  29. anonymization Alice Encrypted encryption Votes Bridget Verification Ballot Data Flow

  30. decryption anonymization Alice Encrypted encryption Votes Bridget Verification Ballot Data Flow

  31. decryption anonymization Alice Encrypted encryption Votes Bridget Tally Results Verification Ballot Data Flow

  32. decryption anonymization Alice Encrypted encryption Votes Bridget Tally Results Registration Database Verification Ballot Data Flow

  33. The Need for Simple

  34. The Need for Simple • Too complicated = disenfranchisement. voter experience needs to be almost as simple as it is today

  35. The Need for Simple • Too complicated = disenfranchisement. voter experience needs to be almost as simple as it is today • Intuitive enough for officials to adopt

  36. The Need for Simple • Too complicated = disenfranchisement. voter experience needs to be almost as simple as it is today • Intuitive enough for officials to adopt • But... let’s not expect everyone to understand everything.

  37. Continuing the Simplicity Trend • Chaum’s Punchscan • Ryan’s Prêt-à-Voter • Benaloh’s “simple cryptographic voting”

  38. Scratch-and-Vote Experience

  39. Charlie _______ Adam _______ Bob _______ Bob _______ David _______ Charlie _______ David _______ Adam _______ 1. Receive two ballots.

  40. Charlie _______ Charlie Adam _______ Adam Bob _______ Bob David _______ David r 1 r 2 r 3 r 4 2. Choose one randomly for auditing by scratch-off.

  41. Bob _______ Charlie _______ David _______ Adam _______ 3. Vote.

  42. Adam Charlie Charlie Bob Bob Bob David Charlie _______ Adam Adam David David Bob _______ Charlie _______ David _______ Adam 4. Tear & Discard left half of ballot.

  43. _______ _______ _______ _______ Scan & take home 5. Tear & Discard scratch-off.

  44. Tallying

  45. Bulletin Board Alice Bridget Carol _______ _______ _______ _______ _______ _______ _______ _______ _______ _______ _______ _______

  46. PARAMETERS #1 - Adam #2 - Bob #3 - Charlie #4 - David E pk (2 28 ; r 1 ) M=28, Key = pk Bob _______ E pk (2 56 ; r 2 ) Charlie _______ E pk (2 84 ; r 3 ) David _______ E pk (2 0 ; r 4 ) Adam H ( pk ) _______ r 1 r 2 r 3 r 4

  47. Homomorphic Tallying 0001 0000 0000 0000 Vote for Adam 0000 0001 0000 0000 Vote for Bob 0000 0000 0001 0000 Vote for Charlie 0000 0000 0000 0001 Vote for David 0004 0001 0008 0002 Sample Tally [B+2001, P1999]

  48. Proof of Ballot (NIZK)

  49. Proof of Ballot (NIZK) • Malicious Voter submits: Enc(1000)

  50. Proof of Ballot (NIZK) • Malicious Voter submits: Enc(1000) • in S&V, ciphertexts are picked ahead of time

  51. Proof of Ballot (NIZK) • Malicious Voter submits: Enc(1000) • in S&V, ciphertexts are picked ahead of time • but... what if election officials collude with a voter to throw the election with a bad ballot?

  52. Proof of Ballot (NIZK) • Malicious Voter submits: Enc(1000) • in S&V, ciphertexts are picked ahead of time • but... what if election officials collude with a voter to throw the election with a bad ballot? • election officials must prepare proofs of correct ballot form ahead of time, on bulletin board (~80K per full ballot).

  53. Practical Considerations 5 questions, 5 options per question. • Ballot Verification : less than a second. • Barcode Encoding : PDF417 open standard. • Barcode Size : 10 square inches of barcode for a full sheet visual ballot. • Proof Time : ~3 seconds per ballot.

  54. Limitations • Write-in Votes : not supported • Take-Home Receipt : not currently legal

  55. Scratch & Vote • Personal Verification : scratch and verify • Open-Audit : anyone can verify the tally • Incoercible : voting booth & encryption • Simple : common & cheap tech, process is close to current voting.

  56. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend