Presentation is loading. Please wait.

Presentation is loading. Please wait.

TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.

Similar presentations


Presentation on theme: "TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012."— Presentation transcript:

1 TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012

2 Outline  Introduction  Vote Verification Technologies  Open Issues  Verifiability Through Open Standard  Approach  Contribution  Future Work Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

3 E-voting Technologies DRE (Direct Recording Electronics) Optical Scan Internet Voting Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

4 E-Voting  Some of the advantages include:  Speeding up vote casting and tallying  Assisting illiterate and disabled to cast vote independently  Reducing voter mistakes (e.g., over- or under voting) Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

5 Vote Verification  E-voting adoption still slow and criticized !! people need to trust the system.  Vote verification is a way to address this issue.  Validate vote during and/or after casting  Support an evidence to election participating entities Vote has been processed as intended Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

6 Vote Verification Techniques (in polling place)  Polling Place Verification  VVAATT (Voter Verified Audio Audit Transcript Trail) [T. Selker]  VVPAT (Voter Verifiable Paper Audit Trail) [R. Mercuri]  Pynx.VM [Scytle]  End-to-End Verification  Votegrity [D. Chaum]  Prêt à Voter [P. Ryan] Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

7 Open Issues  Public verifiability is weakly supported.  No Common Standard for Verification.  E.g., vendor lock-in  Some of them, ‘Still’ may Exposed for Invasion  Weak in resisting different levels of attacks. Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

8 Problem Statement  How to design an open verification methodology for vote verification for specific class of e-voting technology, with the goal of achieving:  Standardization.  Independent verification by Third party. ? Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany. We select DRE…

9 DRE System Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany. Our approach…

10 Approach Open Vote Verification Protocol E-Voting Machine Voter Election Officials Public Observers VM Select Feed back Report Compare Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany. Cast AFTER CLOSING POLLING PLACE!

11 What public needs ? E-Voting Machine VM XML Ballot, XML Election Verification Software XML Ballot XML Election Voting Software XML Ballot Open Verification Protocol Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

12 What is the contents of XMLs ?  XML Elections  Election Name and Date  Precincts Names and locations  DRE Serials Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.  XML Ballot  Contests and Related Candidates  Referendum Options The structure of XML Election and Ballot File described by standard EML (Election Markup Language) Schemas

13 Election Markup Language (EML)  EML [OASIS]  XML-based standard to support end to end management of election processes  Support structured interchange of data among hardware, software, and service providers Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

14 Possible Contributions  Standardization gives the possibility for different firms to produce verification components  To avoid putting trust on a single vendor producer of voting components. Standardization, Independent Verification, Public Verifiability Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

15 Possible Contributions  Independent verification can facilitate attacks detection and feedback mechanism  Verify system against malicious actions and system fail Standardization, Independent Verification, Public Verifiability Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

16 Possible Contributions  Enhancing transparency through public verifiability  Improve public verifiability against (insider) attacks (e.g., electoral staffs) Standardization, Independent Verification, Public Verifiability Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

17 Future Work  Building Prototype  Using EVM2003 Open Source DRE (Python)  Build a VM compatible to work with EVM2003  Run virtual election process  Analyze the prototype Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.

18 Thank You for Your Attention

19 Approach Connect DRE, VM Election name, Date, Precinct Name and DRE Serial - Send voter Selection to VM - Voter Verify Selection -Voter Cast -Copy of vote stored in VM -Public get VM report (only Report) -DRE and VM Reports verified Sec Vote 2012 Summer School, 16-20 July, 2012, Schloss Dagstuhl, Germany.


Download ppt "TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012."

Similar presentations


Ads by Google