Voting Lecture 22 Requirements Requirements Integrity/End-to-End - - PowerPoint PPT Presentation

voting
SMART_READER_LITE
LIVE PREVIEW

Voting Lecture 22 Requirements Requirements Integrity/End-to-End - - PowerPoint PPT Presentation

Voting Lecture 22 Requirements Requirements Integrity/End-to-End verifiability Requirements Integrity/End-to-End verifiability Collected as cast: Each voter should be convinced that their vote was collected correctly Requirements


slide-1
SLIDE 1

Voting

Lecture 22

slide-2
SLIDE 2

Requirements

slide-3
SLIDE 3

Requirements

Integrity/End-to-End verifiability

slide-4
SLIDE 4

Requirements

Integrity/End-to-End verifiability Collected as cast: Each voter should be convinced that their vote was collected correctly

slide-5
SLIDE 5

Requirements

Integrity/End-to-End verifiability Collected as cast: Each voter should be convinced that their vote was collected correctly Counted as collected: Tallying is publicly verifiable

slide-6
SLIDE 6

Requirements

Integrity/End-to-End verifiability Collected as cast: Each voter should be convinced that their vote was collected correctly Counted as collected: Tallying is publicly verifiable Secrecy

slide-7
SLIDE 7

Requirements

Integrity/End-to-End verifiability Collected as cast: Each voter should be convinced that their vote was collected correctly Counted as collected: Tallying is publicly verifiable Secrecy Honest voters’ votes are not revealed by the system (beyond what the tally reveals)

slide-8
SLIDE 8

Requirements

Integrity/End-to-End verifiability Collected as cast: Each voter should be convinced that their vote was collected correctly Counted as collected: Tallying is publicly verifiable Secrecy Honest voters’ votes are not revealed by the system (beyond what the tally reveals) Incoercibility: Even corrupt voters should not be able to convince an adversary about their vote (i.e., no vote-buying/ selling)

slide-9
SLIDE 9

A Voting Architecture

slide-10
SLIDE 10

A Voting Architecture

Produce a public list which encodes all the votes cast

slide-11
SLIDE 11

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list

slide-12
SLIDE 12

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth

slide-13
SLIDE 13

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list

slide-14
SLIDE 14

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated

slide-15
SLIDE 15

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated Front-End

slide-16
SLIDE 16

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated Front-End Ballot Preparation

slide-17
SLIDE 17

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated Front-End Ballot Preparation Vote capturing/ Receipt issue

slide-18
SLIDE 18

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated Front-End Ballot Preparation Vote capturing/ Receipt issue Verification

slide-19
SLIDE 19

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated Front-End Ballot Preparation Vote capturing/ Receipt issue Verification Back-End

slide-20
SLIDE 20

A Voting Architecture

Produce a public list which encodes all the votes cast Individual voters can verify that their vote is correctly captured in this list Based on a receipt (and other knowledge) from the polling booth Tallying is done on this list Publicly verifiable that the posted votes are correctly tabulated Front-End Ballot Preparation Vote capturing/ Receipt issue Verification Back-End Tallying/Verification

slide-21
SLIDE 21

Use MPC?

slide-22
SLIDE 22

Use MPC?

Impractical

slide-23
SLIDE 23

Use MPC?

Impractical In the front-end, want voters not to have to do crypto, and arrive/leave one by one

slide-24
SLIDE 24

Use MPC?

Impractical In the front-end, want voters not to have to do crypto, and arrive/leave one by one OK in the back-end, but needs to be very efficient if a large election

slide-25
SLIDE 25

Use MPC?

Impractical In the front-end, want voters not to have to do crypto, and arrive/leave one by one OK in the back-end, but needs to be very efficient if a large election Doesn’ t account for incoercibility (unless security requirement augmented)

slide-26
SLIDE 26

Incoercibility

slide-27
SLIDE 27

Incoercibility

Coercion: voters can get rewards from adversary by following adversary’ s instructions in a detectable fashion

slide-28
SLIDE 28

Incoercibility

Coercion: voters can get rewards from adversary by following adversary’ s instructions in a detectable fashion What is not coercion?

slide-29
SLIDE 29

Incoercibility

Coercion: voters can get rewards from adversary by following adversary’ s instructions in a detectable fashion What is not coercion? e.g. Adversary rewards the entire set of voters if all votes are for candidate A

slide-30
SLIDE 30

Incoercibility

Coercion: voters can get rewards from adversary by following adversary’ s instructions in a detectable fashion What is not coercion? e.g. Adversary rewards the entire set of voters if all votes are for candidate A Is coercion: Voters cannot behave arbitrarily and still collect the reward

slide-31
SLIDE 31

Incoercibility

Coercion: voters can get rewards from adversary by following adversary’ s instructions in a detectable fashion What is not coercion? e.g. Adversary rewards the entire set of voters if all votes are for candidate A Is coercion: Voters cannot behave arbitrarily and still collect the reward But unavoidable coercion (even in an Ideal world)

slide-32
SLIDE 32

Incoercibility

Coercion: voters can get rewards from adversary by following adversary’ s instructions in a detectable fashion What is not coercion? e.g. Adversary rewards the entire set of voters if all votes are for candidate A Is coercion: Voters cannot behave arbitrarily and still collect the reward But unavoidable coercion (even in an Ideal world) We need to protect against further coercion than is possible in the Ideal world

slide-33
SLIDE 33

Env

F

F

Env REAL/coerced IDEAL/coerced

Defining Incoercibility

Real as incoercible (and secure) as Ideal if:

slide-34
SLIDE 34

Env

F

F

Env REAL/coerced IDEAL/coerced Env

F

F

IDEAL/uncoerced

Defining Incoercibility

Real as incoercible (and secure) as Ideal if:

slide-35
SLIDE 35

Env

F

F

Env REAL/coerced IDEAL/coerced Env REAL/uncoerced Env

F

F

IDEAL/uncoerced

Defining Incoercibility

Real as incoercible (and secure) as Ideal if:

slide-36
SLIDE 36

Env

F

F

Env REAL/coerced IDEAL/coerced Env REAL/uncoerced ∀ and ∃ and s.t. ∀ 
 IDEAL/c ≈ REAL/c
 and
 IDEAL/u ≈ REAL/u Env

F

F

IDEAL/uncoerced

Defining Incoercibility

Real as incoercible (and secure) as Ideal if:

slide-37
SLIDE 37

Env

F

F

Env REAL/coerced IDEAL/coerced Env REAL/uncoerced Hence REAL/c and REAL/u

  • nly as distinguishable as


IDEAL/c and IDEAL/u ∀ and ∃ and s.t. ∀ 
 IDEAL/c ≈ REAL/c
 and
 IDEAL/u ≈ REAL/u Env

F

F

IDEAL/uncoerced

Defining Incoercibility

Real as incoercible (and secure) as Ideal if:

slide-38
SLIDE 38

Env

F

F

Env REAL/coerced IDEAL/coerced Env REAL/uncoerced Hence REAL/c and REAL/u

  • nly as distinguishable as


IDEAL/c and IDEAL/u ∀ and ∃ and s.t. ∀ 
 IDEAL/c ≈ REAL/c
 and
 IDEAL/u ≈ REAL/u Env

F

F

IDEAL/uncoerced

Defining Incoercibility

i.e., if coercion can be (somewhat) simulated in Ideal, it can be (somewhat) simulated in Real too Real as incoercible (and secure) as Ideal if:

slide-39
SLIDE 39

Env

F

F

Env REAL/coerced IDEAL/coerced Env REAL/uncoerced Hence REAL/c and REAL/u

  • nly as distinguishable as


IDEAL/c and IDEAL/u ∀ and ∃ and s.t. ∀ 
 IDEAL/c ≈ REAL/c
 and
 IDEAL/u ≈ REAL/u Env

F

F

IDEAL/uncoerced

Defining Incoercibility

Definition says nothing about the existence/choice of the Ideal coercion simulator i.e., if coercion can be (somewhat) simulated in Ideal, it can be (somewhat) simulated in Real too Real as incoercible (and secure) as Ideal if:

slide-40
SLIDE 40

Env

F

F

Env REAL/coerced IDEAL/coerced Env REAL/uncoerced Hence REAL/c and REAL/u

  • nly as distinguishable as


IDEAL/c and IDEAL/u ∀ and ∃ and s.t. ∀ 
 IDEAL/c ≈ REAL/c
 and
 IDEAL/u ≈ REAL/u Env

F

F

IDEAL/uncoerced

Defining Incoercibility

Definition says nothing about the existence/choice of the Ideal coercion simulator i.e., if coercion can be (somewhat) simulated in Ideal, it can be (somewhat) simulated in Real too Real as incoercible (and secure) as Ideal if: Meaningful only if Real/u 
 simulator is realistic

slide-41
SLIDE 41

e-Voting:

First Try

slide-42
SLIDE 42

e-Voting:

First Try

Front-end:

slide-43
SLIDE 43

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext

slide-44
SLIDE 44

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted

slide-45
SLIDE 45

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted Back-end:

slide-46
SLIDE 46

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted Back-end: A mix-net shuffles, decrypts the set of votes. Publicly tallied

slide-47
SLIDE 47

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted Back-end: A mix-net shuffles, decrypts the set of votes. Publicly tallied Each candidate/observer can have a mix-net server

slide-48
SLIDE 48

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted Back-end: A mix-net shuffles, decrypts the set of votes. Publicly tallied Each candidate/observer can have a mix-net server Public proofs given to each other (or to the public at large, using Fiat-Shamir heuristics)

slide-49
SLIDE 49

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted Back-end: A mix-net shuffles, decrypts the set of votes. Publicly tallied Each candidate/observer can have a mix-net server Public proofs given to each other (or to the public at large, using Fiat-Shamir heuristics)

Requires voters to use/trust computational devices

slide-50
SLIDE 50

e-Voting:

First Try

Front-end: Voters encrypt their votes using a threshold encryption scheme (with the decryption key shared among authorities/ candidates), and submit the vote; receives a receipt showing the ciphertext The encrypted vote is publicly posted Back-end: A mix-net shuffles, decrypts the set of votes. Publicly tallied Each candidate/observer can have a mix-net server Public proofs given to each other (or to the public at large, using Fiat-Shamir heuristics)

Requires voters to use/trust computational devices Provide encryption devices that have been “verified” by the public? (Perception of) threats: difficulty in verifying devices, substituting devices...

slide-51
SLIDE 51

Challenge

slide-52
SLIDE 52

Challenge

Keep it simple for the voter

slide-53
SLIDE 53

Challenge

Keep it simple for the voter No crypto to ensure vote collected as cast

slide-54
SLIDE 54

Challenge

Keep it simple for the voter No crypto to ensure vote collected as cast Public list will contain information that proves to the voter that the vote collected is as cast

slide-55
SLIDE 55

Challenge

Keep it simple for the voter No crypto to ensure vote collected as cast Public list will contain information that proves to the voter that the vote collected is as cast Should not allow voter to prove to a vote-buyer how the vote was cast

slide-56
SLIDE 56

Challenge

Keep it simple for the voter No crypto to ensure vote collected as cast Public list will contain information that proves to the voter that the vote collected is as cast Should not allow voter to prove to a vote-buyer how the vote was cast e.g., not OK to let the voter submit (multiple rerandomized) ciphertexts and get them decrypted later

slide-57
SLIDE 57

Prêt à Voter

slide-58
SLIDE 58

Prêt à Voter

Ballot has two parts

slide-59
SLIDE 59

Prêt à Voter

Ballot has two parts

Carol Alice Barack

X

ahdf87

slide-60
SLIDE 60

Prêt à Voter

Ballot has two parts

Carol Alice Barack

X

ahdf87

slide-61
SLIDE 61

Prêt à Voter

Ballot has two parts Left-hand side: Candidate list

Carol Alice Barack

X

ahdf87

slide-62
SLIDE 62

Prêt à Voter

Ballot has two parts Left-hand side: Candidate list Right-hand side: Vote-mark and encrypted
 candidate list (and a serial number)

Carol Alice Barack

X

ahdf87

slide-63
SLIDE 63

Prêt à Voter

Ballot has two parts Left-hand side: Candidate list Right-hand side: Vote-mark and encrypted
 candidate list (and a serial number) Right-hand part has enough information for tallying. Will be posted

  • publicly. Also serves as receipt.

Carol Alice Barack

X

ahdf87

slide-64
SLIDE 64

Prêt à Voter

Ballot has two parts Left-hand side: Candidate list Right-hand side: Vote-mark and encrypted
 candidate list (and a serial number) Right-hand part has enough information for tallying. Will be posted

  • publicly. Also serves as receipt.

Auditing assures that w.h.p the two parts are consistent

Carol Alice Barack

X

ahdf87

slide-65
SLIDE 65

Prêt à Voter

Ballot has two parts Left-hand side: Candidate list Right-hand side: Vote-mark and encrypted
 candidate list (and a serial number) Right-hand part has enough information for tallying. Will be posted

  • publicly. Also serves as receipt.

Auditing assures that w.h.p the two parts are consistent Voter retains a copy of the right-hand part (with a digital signature, possibly verified by helpers outside the booth, to prevent false claims) as a receipt to verify the publicly posted vote. Left-hand part must be destroyed before leaving the polling-booth.

Carol Alice Barack

X

ahdf87

slide-66
SLIDE 66

Prêt à Voter

Carol Alice Barack

X

ahdf87

slide-67
SLIDE 67

Prêt à Voter

Tallying: combine vote-mark and encrypted 
 candidate list into an encrypted vote

Carol Alice Barack

X

ahdf87

slide-68
SLIDE 68

Prêt à Voter

Tallying: combine vote-mark and encrypted 
 candidate list into an encrypted vote Candidate list is cyclically permuted by s positions

Carol Alice Barack

X

ahdf87

slide-69
SLIDE 69

Prêt à Voter

Tallying: combine vote-mark and encrypted 
 candidate list into an encrypted vote Candidate list is cyclically permuted by s positions Encryption encodes s

Carol Alice Barack

X

ahdf87

slide-70
SLIDE 70

Prêt à Voter

Tallying: combine vote-mark and encrypted 
 candidate list into an encrypted vote Candidate list is cyclically permuted by s positions Encryption encodes s Homomorphically add vote-mark position to encryption

  • f s, to get encryption of candidate’

s index

Carol Alice Barack

X

ahdf87

slide-71
SLIDE 71

Prêt à Voter

Tallying: combine vote-mark and encrypted 
 candidate list into an encrypted vote Candidate list is cyclically permuted by s positions Encryption encodes s Homomorphically add vote-mark position to encryption

  • f s, to get encryption of candidate’

s index Additive homomorphism: Use Paillier, or El Gamal with messages in the exponent (since only a few messages possible)

Carol Alice Barack

X

ahdf87

slide-72
SLIDE 72

Prêt à Voter

Carol Alice Barack

X

ahdf87

slide-73
SLIDE 73

Prêt à Voter

Counted as collected: ensured by the mix-net

Carol Alice Barack

X

ahdf87

slide-74
SLIDE 74

Prêt à Voter

Counted as collected: ensured by the mix-net To ensure collected as cast, need to ensure 
 that the ballot papers are correctly formed

Carol Alice Barack

X

ahdf87

slide-75
SLIDE 75

Prêt à Voter

Counted as collected: ensured by the mix-net To ensure collected as cast, need to ensure 
 that the ballot papers are correctly formed Auditing: before voting, select a random subset of ballots and have them decrypted

Carol Alice Barack

X

ahdf87

slide-76
SLIDE 76

Prêt à Voter

Counted as collected: ensured by the mix-net To ensure collected as cast, need to ensure 
 that the ballot papers are correctly formed Auditing: before voting, select a random subset of ballots and have them decrypted If no errors found in a large random sample (say half the ballots) probability of more than a few bad ballots is very small ( ⪅ 2-t probability that more than t bad)

Carol Alice Barack

X

ahdf87

slide-77
SLIDE 77

Carol Alice Barack

X

ahdf87

Prêt à Voter

slide-78
SLIDE 78

For secrecy, need to ensure LHS of ballot-paper
 remains secret (till voting) and encryption in
 the RHS is honest (i.e., randomly generated)

Carol Alice Barack

X

ahdf87

Prêt à Voter

slide-79
SLIDE 79

For secrecy, need to ensure LHS of ballot-paper
 remains secret (till voting) and encryption in
 the RHS is honest (i.e., randomly generated) A trusted/audited ballot-sheet printer with
 an encryption key pair

Carol Alice Barack

X

ahdf87

Prêt à Voter

slide-80
SLIDE 80

For secrecy, need to ensure LHS of ballot-paper
 remains secret (till voting) and encryption in
 the RHS is honest (i.e., randomly generated) A trusted/audited ballot-sheet printer with
 an encryption key pair Use MPC (among candidates/trustees) to encrypt a random rotation twice: one ciphertext using printer’ s PK (in the left-hand side) and one using the mix-net’ s PK

Carol Alice Barack

X

ahdf87 x5qu0d

Prêt à Voter

slide-81
SLIDE 81

For secrecy, need to ensure LHS of ballot-paper
 remains secret (till voting) and encryption in
 the RHS is honest (i.e., randomly generated) A trusted/audited ballot-sheet printer with
 an encryption key pair Use MPC (among candidates/trustees) to encrypt a random rotation twice: one ciphertext using printer’ s PK (in the left-hand side) and one using the mix-net’ s PK At the polling-booth the printer decrypts the left-hand ciphertext, and prints the candidate names in order

Carol Alice Barack

X

ahdf87 x5qu0d

Prêt à Voter

slide-82
SLIDE 82

For secrecy, need to ensure LHS of ballot-paper
 remains secret (till voting) and encryption in
 the RHS is honest (i.e., randomly generated) A trusted/audited ballot-sheet printer with
 an encryption key pair Use MPC (among candidates/trustees) to encrypt a random rotation twice: one ciphertext using printer’ s PK (in the left-hand side) and one using the mix-net’ s PK At the polling-booth the printer decrypts the left-hand ciphertext, and prints the candidate names in order

Carol Alice Barack

X

ahdf87 x5qu0d

Prêt à Voter

slide-83
SLIDE 83

For secrecy, need to ensure LHS of ballot-paper
 remains secret (till voting) and encryption in
 the RHS is honest (i.e., randomly generated) A trusted/audited ballot-sheet printer with
 an encryption key pair Use MPC (among candidates/trustees) to encrypt a random rotation twice: one ciphertext using printer’ s PK (in the left-hand side) and one using the mix-net’ s PK At the polling-booth the printer decrypts the left-hand ciphertext, and prints the candidate names in order Can be audited by the voter: choose one of (say) two ballot sheets for auditing later; printer’ s key kept shared among auditors who can audit sheets selected by the voters

Carol Alice Barack

X

ahdf87 x5qu0d

Prêt à Voter

slide-84
SLIDE 84

Threats/Remedies

slide-85
SLIDE 85

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet

slide-86
SLIDE 86

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given

slide-87
SLIDE 87

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given Randomization attack: Coercer can ask voters to mark the first candidate, thereby ensuring they vote randomly

slide-88
SLIDE 88

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given Randomization attack: Coercer can ask voters to mark the first candidate, thereby ensuring they vote randomly Comparable to coercing to not cast a vote (allowed in Ideal)

slide-89
SLIDE 89

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given Randomization attack: Coercer can ask voters to mark the first candidate, thereby ensuring they vote randomly Comparable to coercing to not cast a vote (allowed in Ideal) Discarded receipt attack: If corrupt election authority learns that a receipt was discarded, can safely change the collected vote

slide-90
SLIDE 90

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given Randomization attack: Coercer can ask voters to mark the first candidate, thereby ensuring they vote randomly Comparable to coercing to not cast a vote (allowed in Ideal) Discarded receipt attack: If corrupt election authority learns that a receipt was discarded, can safely change the collected vote Retained left-hand part: can be used to sell votes

slide-91
SLIDE 91

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given Randomization attack: Coercer can ask voters to mark the first candidate, thereby ensuring they vote randomly Comparable to coercing to not cast a vote (allowed in Ideal) Discarded receipt attack: If corrupt election authority learns that a receipt was discarded, can safely change the collected vote Retained left-hand part: can be used to sell votes Ensure it is destroyed. Also make decoys available

slide-92
SLIDE 92

Threats/Remedies

Chain voting: One ballot-sheet smuggled out and marked. Then repeatedly coerce voters to use the marked ballot-sheet and return with a blank ballot-sheet Officials should ensure ballot-sheet turned in is the same as ballot-sheet given Randomization attack: Coercer can ask voters to mark the first candidate, thereby ensuring they vote randomly Comparable to coercing to not cast a vote (allowed in Ideal) Discarded receipt attack: If corrupt election authority learns that a receipt was discarded, can safely change the collected vote Retained left-hand part: can be used to sell votes Ensure it is destroyed. Also make decoys available Printer’ s key known: Attack if also (LHS,RHS) pairing known

slide-93
SLIDE 93

Some Other Schemes

slide-94
SLIDE 94

Some Other Schemes

Several schemes

slide-95
SLIDE 95

Some Other Schemes

Several schemes Few security definitions/proofs

slide-96
SLIDE 96

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan

slide-97
SLIDE 97

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan Two-layer ballot-sheet

slide-98
SLIDE 98

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan Two-layer ballot-sheet

q r m x

8c3sw

Adam - x Bob - q Charlie - r David - m

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

slide-99
SLIDE 99

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan Two-layer ballot-sheet Scratch-and-Vote

q r m x

8c3sw

Adam - x Bob - q Charlie - r David - m

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

slide-100
SLIDE 100

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan Two-layer ballot-sheet Scratch-and-Vote

q r m x

8c3sw

Adam - x Bob - q Charlie - r David - m

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

c a b d Adam - a Bob - b Charlie - c David - d c a b d c a b d

d b c a c a b d a b d c

Adam - a Bob - b Charlie - c David - d

slide-101
SLIDE 101

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan Two-layer ballot-sheet Scratch-and-Vote Punchscan variant

q r m x

8c3sw

Adam - x Bob - q Charlie - r David - m

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

c a b d Adam - a Bob - b Charlie - c David - d c a b d c a b d

d b c a c a b d a b d c

Adam - a Bob - b Charlie - c David - d

slide-102
SLIDE 102

Some Other Schemes

Several schemes Few security definitions/proofs Punchscan Two-layer ballot-sheet Scratch-and-Vote Punchscan variant To audit a ballot-sheet, scratch off and obtain randomness used in encryption

q r m x

8c3sw

Adam - x Bob - q Charlie - r David - m

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

q r m x Adam - x Bob - q Charlie - r David - m q r m x

8c3sw

c a b d Adam - a Bob - b Charlie - c David - d c a b d c a b d

d b c a c a b d a b d c

Adam - a Bob - b Charlie - c David - d

slide-103
SLIDE 103

Back-Ends

slide-104
SLIDE 104

Back-Ends

Efficient (and publicly verifiable) MPC for tallying encrypted votes

slide-105
SLIDE 105

Back-Ends

Efficient (and publicly verifiable) MPC for tallying encrypted votes Using mix-nets: Shuffle, decrypt and tally

slide-106
SLIDE 106

Back-Ends

Efficient (and publicly verifiable) MPC for tallying encrypted votes Using mix-nets: Shuffle, decrypt and tally Using homomorphic counters: Tally and decrypt

slide-107
SLIDE 107

Back-Ends

Efficient (and publicly verifiable) MPC for tallying encrypted votes Using mix-nets: Shuffle, decrypt and tally Using homomorphic counters: Tally and decrypt A single counter that is the concatenation of counters for each candidate

slide-108
SLIDE 108

Back-Ends

Efficient (and publicly verifiable) MPC for tallying encrypted votes Using mix-nets: Shuffle, decrypt and tally Using homomorphic counters: Tally and decrypt A single counter that is the concatenation of counters for each candidate To add to a counter for a candidate, must add after appropriately shifting

slide-109
SLIDE 109

Back-Ends

Efficient (and publicly verifiable) MPC for tallying encrypted votes Using mix-nets: Shuffle, decrypt and tally Using homomorphic counters: Tally and decrypt A single counter that is the concatenation of counters for each candidate To add to a counter for a candidate, must add after appropriately shifting In Prêt à Voter, information on RHS: encryptions of the shifted value to be added for each possible mark

slide-110
SLIDE 110

Other Issues

slide-111
SLIDE 111

Other Issues

Dispute resolution (without compromising voter’ s privacy)

slide-112
SLIDE 112

Other Issues

Dispute resolution (without compromising voter’ s privacy) Subliminal channels from polling booth to the adversary that facilitate coercion

slide-113
SLIDE 113

Other Issues

Dispute resolution (without compromising voter’ s privacy) Subliminal channels from polling booth to the adversary that facilitate coercion Coerced voters could be asked to bring along a “verifier” (implemented as scratch cards etc.) to which they should “prove” that they are voting as promised

slide-114
SLIDE 114

Other Issues

Dispute resolution (without compromising voter’ s privacy) Subliminal channels from polling booth to the adversary that facilitate coercion Coerced voters could be asked to bring along a “verifier” (implemented as scratch cards etc.) to which they should “prove” that they are voting as promised Aggravated by allowing voters to audit at the polling- booth

slide-115
SLIDE 115

Other Issues

Dispute resolution (without compromising voter’ s privacy) Subliminal channels from polling booth to the adversary that facilitate coercion Coerced voters could be asked to bring along a “verifier” (implemented as scratch cards etc.) to which they should “prove” that they are voting as promised Aggravated by allowing voters to audit at the polling- booth Internet voting?

slide-116
SLIDE 116

Other Issues

Dispute resolution (without compromising voter’ s privacy) Subliminal channels from polling booth to the adversary that facilitate coercion Coerced voters could be asked to bring along a “verifier” (implemented as scratch cards etc.) to which they should “prove” that they are voting as promised Aggravated by allowing voters to audit at the polling- booth Internet voting? Coercion is hard to prevent, but can be mitigated by allowing voters to change votes any time

slide-117
SLIDE 117

Voting Schemes

slide-118
SLIDE 118

Voting Schemes

“Standard” (a.k.a plurality rule or First Past the Pole): each voter has a single vote and candidate with most votes win

slide-119
SLIDE 119

Voting Schemes

“Standard” (a.k.a plurality rule or First Past the Pole): each voter has a single vote and candidate with most votes win Approval voting: a voter can vote for arbitrary number of candidates; candidate with most votes win

slide-120
SLIDE 120

Voting Schemes

“Standard” (a.k.a plurality rule or First Past the Pole): each voter has a single vote and candidate with most votes win Approval voting: a voter can vote for arbitrary number of candidates; candidate with most votes win Condorcet voting: voters provide a full-ranking; defines a “tournament” between candidates, so that A beats B if A appears above B in more rankings than vice versa. If the tournament has a champion who beats everyone else, that candidate wins. Several special rules for handling cycles.

slide-121
SLIDE 121

Voting Schemes

“Standard” (a.k.a plurality rule or First Past the Pole): each voter has a single vote and candidate with most votes win Approval voting: a voter can vote for arbitrary number of candidates; candidate with most votes win Condorcet voting: voters provide a full-ranking; defines a “tournament” between candidates, so that A beats B if A appears above B in more rankings than vice versa. If the tournament has a champion who beats everyone else, that candidate wins. Several special rules for handling cycles. Multiple round tallying: Supplementary vote, Instant Run-off elections, Single Transferable Vote

slide-122
SLIDE 122

Voting Schemes

“Standard” (a.k.a plurality rule or First Past the Pole): each voter has a single vote and candidate with most votes win Approval voting: a voter can vote for arbitrary number of candidates; candidate with most votes win Condorcet voting: voters provide a full-ranking; defines a “tournament” between candidates, so that A beats B if A appears above B in more rankings than vice versa. If the tournament has a champion who beats everyone else, that candidate wins. Several special rules for handling cycles. Multiple round tallying: Supplementary vote, Instant Run-off elections, Single Transferable Vote Front-end and back-end need to be modified

slide-123
SLIDE 123

Summary

slide-124
SLIDE 124

Summary

Several proposals for electronic voting

slide-125
SLIDE 125

Summary

Several proposals for electronic voting Crypto tools based on homomorphic encryption

slide-126
SLIDE 126

Summary

Several proposals for electronic voting Crypto tools based on homomorphic encryption Aims to get unprecedented level of confidence from individual voters and public auditors (E2E security)

slide-127
SLIDE 127

Summary

Several proposals for electronic voting Crypto tools based on homomorphic encryption Aims to get unprecedented level of confidence from individual voters and public auditors (E2E security) Challenge: Increases risk of coercion

slide-128
SLIDE 128

Summary

Several proposals for electronic voting Crypto tools based on homomorphic encryption Aims to get unprecedented level of confidence from individual voters and public auditors (E2E security) Challenge: Increases risk of coercion A cyber-physical system with avenue for new protocol techniques and attacks

slide-129
SLIDE 129

Summary

Several proposals for electronic voting Crypto tools based on homomorphic encryption Aims to get unprecedented level of confidence from individual voters and public auditors (E2E security) Challenge: Increases risk of coercion A cyber-physical system with avenue for new protocol techniques and attacks Few satisfactory security definitions yet (let alone proofs)