A method for electronic voting with Coercion-free receipt David J. Reynolds (unaffiliated)

Slides:



Advertisements
Similar presentations
Research & Development Workshop on e-Voting and e-Government in the UK - February 27, 2006 Votinbox - a voting system based on smart cards Sébastien Canard.
Advertisements

Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
Vote privacy: models and cryptographic underpinnings Bogdan Warinschi University of Bristol 1.
Talk by Vanessa Teague, University of Melbourne Joint work with Chris Culnane, James Heather & Steve Schneider at University of.
Electronic Voting Ronald L. Rivest MIT CSAIL Norway June 14, 2004.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Civitas Verifiability and Coercion Resistance for Remote Voting University of South Alabama August 15, 2012 Michael Clarkson The George Washington University.
Civitas Security and Transparency for Remote Voting Swiss E-Voting Workshop September 6, 2010 Michael Clarkson Cornell University with Stephen Chong (Harvard)
Wombat Voting 1.Designed ( ) 2.Implemented ( ) 3.Deployed (1 x 2011, 2 x 2012)
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
Wombat Voting Alon Rosen IDC Herzliya July 20, 2012.
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran Joint work with Moni Naor.
Electronic Voting Presented by Ben Riva Based on presentations and papers of: Schoenmakers, Benaloh, Fiat, Adida, Reynolds, Ryan and Chaum.
Self-Enforcing E-Voting (SEEV) Feng Hao Newcastle University, UK CryptoForma’13, Egham.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Reusable Anonymous Return Channels
Research & development A Practical and Coercion-resistant scheme for Internet Voting Jacques Traoré (joint work with Roberto Araújo and Sébastien Foulle)
Josh Benaloh Senior Cryptographer Microsoft Research.
© VoteHere, Inc. All rights reserved. November 2004 VHTi Data Demonstration Andrew Berg Director, Engineering.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
Ben Hosp, Nils Janson, Phillipe Moore, John Rowe, Rahul Simha, Jonathan Stanton, Poorvi Vora {bhosp, simha, jstanton, Dept. of Computer.
Kickoff Meeting „E-Voting Seminar“
Trustworthy Elections without Paper Ballots Why vote receipts deserve consideration May 26, 2004 C. Andrew Neff, Ph.D. Chief Scientist VoteHere, Inc.
Paillier Threshold Encryption WebService by Brett Wilson.
Receipt-freeness and coercion-resistance: formal definitions and fault attacks Stéphanie Delaune / Steve Kremer / Mark D. Ryan.
The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
1/11/2007 bswilson/eVote-PTCWS 1 Enhancing PTC based Secure E-Voting System (note: modification of Brett Wilson’s Paillier Threshold Cryptography Web Service.
PRESENTED BY CHRIS ANDERSON JULY 29, 2009 Using Zero Knowledge Proofs to Validate Electronic Votes.
How Elections Should Really Be Run Josh Benaloh Senior Cryptographer Microsoft Research.
Author: Michał Rajkowski Tutor: prof. dr hab. inż. Zbigniew Kotulski.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
Cryptographic Voting Systems (Ben Adida) Jimin Park Carleton University COMP 4109 Seminar 15 February 2011.
Masked Ballot Voting for Receipt-Free Online Elections Sam Heinith, David Humphrey, and Maggie Watkins.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
A. Steffen, , Kickoff.pptx 1 Kickoff Meeting „E-Voting Seminar“ An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
SANDRA GUASCH CASTELLÓ PHD EVOTING WORKSHOP LUXEMBOURG, 15-16/10/2012 SUPERVISOR: PAZ MORILLO BOSCH Verifiable Mixnets.
A remote voting system based on Prêt à Voter coded by David Lundin Johannes Clos.
The Paillier Cryptosystem
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
Voting System The PunchScan Rick Carback, David Chaum, Jeremy Clark, Aleks Essex, Kevin Fisher, Ben Hosp, Stefan Popoveniuc, and Jeremy Robin.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
WHY THE vvpat has failed
A Brief Introduction to Mix Networks Ari Juels RSA Laboratories © 2001, RSA Security Inc.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Poll Managers Closing the Polls 2015 ECAM Convention Presented by: Mississippi Secretary of State’s Office Elections Division.
Usable Security Lab Crypto Lab Efficiency Comparison of Various Approaches in E-Voting Protocols Oksana Kulyk, Melanie Volkamer.
Recipt-free Voting Through Distributed Blinding
ThreeBallot, VAV, and Twin
ISI Day – 20th Anniversary
eVoting System Proposal
The Italian Academic Community’s Electronic Voting System
Ronald L. Rivest MIT ShafiFest January 13, 2019
Presentation transcript:

A method for electronic voting with Coercion-free receipt David J. Reynolds (unaffiliated)

The central problem 1.How to get a DRE to properly encrypt a vote? 2.How to ensure encrypted votes are properly tallied?

Some Stricter Requirements End-to-end verifiable No ‘trust’ for integrity ‘Election authorities’ preserve privacy only ‘containment’ is distributed No one authority can expose a vote no trusted computational devices  Voter participates critically in verification

Chaum (optical) --- Neff --- This system --- Expose fraud-in-collection using… Temporal sequence Human optical skills

How it works Analogy Model DRE = ‘Collector’ Collector has invisible-ink pen = public key invisible-ink writing = public-key encrypted Tallier has ‘magic-marker’ magic-marker = private key

Meet with Collector Collector writes your vote using invisible-ink pen; you can’t read invisible ink You can write in ordinary-ink, must not reveal vote Bring your vote to bulletin-board Tallier (privately) uses magic-marker to read invisible ink on your vote Can the Tallier detect fraud by collector? YES!!!

(convention) Represents 625 in invisible ink (= encrypted in public key) Represents 625 in ordinary ink (= plaintext)

Filled ballot (preview)

Terminology “On” = voted for “Off” = not voted for L options The ‘vote’ is the on-option The others are the off-options (K of L voting: K on-options, L-K off-options)

Polling process Voter announces vote=green ‘Verification Phase 1’: voter fills external verification values for off-options collector enters vote; copies external v.-values for off-options to internal ‘Collector commit’: Writes randomly-chosen internal v.-value for on-option ‘Verification Phase 2’: voter fills external verification value for on-option

Verification process Tallier checks that internal verification values equal external verification values for off-options That’s the method!!  ‘Verification condition’

The heart of the method a)During verification/tallying, a condition is checked for each off-option (of the vote as encrypted) b)The Collector can not* satisfy this condition for the on-option (of the true vote) (*P_success = 1/1000) That’s all we need!! MUST MEET TWO CRITERIA

Fraud  on-option of true vote = off-option of vote-as-encrypted a)… a condition is checked for each off- option…. b)The Collector can not* satisfy this condition for the on-option (of the true vote) a) is ensured by the tallying/verification arrangement b) is ensured by the polling sequence and voter vigilance

Important feature Voter just needs to 1)Ensure that the temporal sequence is OK (‘commit’ phase occurs before voter enters v.value for on-option) 2)That the v.value for on-option is as voter specified Voter does not need to check verification-values for off-options (Neff’s method has this feature too)

DRE & Coercion-properties Use identical UI and front-end receipting system to Neff’s Requires printer with minimally-modified housing (commit must be seen to be made, but not readable) Fully coercion-free. Voter has full control over receipt outcome, regardless of vote.

Tallying methods Re-encryption mix-net Chaumian mix-net Without mix-net (with homomorphic encryption)  Complexity linear in L (Independent of K)

Notation Layout in AnalogyTrue DRE receipt Receipt is substantially: ID,,

Homomorphic Tallying. Encrypt vote as an L-tuple (‘unitary’) Encrypting the vote

Homomorphic tallying Proving the vote DRE proves for each k in 1..L in Zero-knowledge OR a. Verification condition To prove 1-of-L (not double-voted on issues) Prove that the product of all encrypts 1  simply reveal the randomizer of the product b. Proving the vote 1-valued DRE proves for each k This proving-1-valued is linear in L (long known method for ‘unitary’ approach)

Homomorphic tallying Counting the vote Trivially linear because of encrypting as L-tuple; all of the votes on options are encrypted separately  Take the product of encrypted votes on each option (through votes of all voters) and Talliers decrypt result = total number of votes on that option

Adapting other methods to achieve homomorphic tallying, linear in L Assume DRE has already verifiably encrypted the vote Assume we can construct reasonable ZKP’s of above form DRE encrypts vote again as L-tuple (unitary) as specified Prove that the in the linear fashion shown above DRE proves that encrypts same vote as provides ZKP for each option k of the vote that OR

Re-encryption Mix-net Tallying. Just need re-encrypt property Encrypting the vote

Re-encrypt. mix-net tallying Proving the vote DRE proves for each k in 1..L in Zero-knowledge OR a. Verification condition Can now go into mix-net

Re-encryption mix-variant Leverage assumed homomorphic property to ‘subtract’ external from internal verifiers while they remain encrypted Results must travel with vote in mix-net Spares ZKPs from DRE, adds complexity to mix- net May be possible to reduce complexity by packing more than one number into 1 (familiar techniques) (d_overall = d_ d_ d_3)

Chaumian Mix-net Tallying Encrypting the vote Input-batch element: Output-batch element: Verification condition (on output element):

DRE-Calculating ahead DRE can keep cache of calculations Assume voter often takes default verification-values for off-options ZKPs only need be calculated for on- option while voter waits Re-fill cache in separate thread

Conclusions Coercion-free verifiable system, very good security properties (p_detection=1/M ) Tally with re-encryption/Chaumian mix-net or homomorphic encryption Homomorphic tallying linear in L

More material Search for ‘Reynolds’ on iacr’s eprint website (Should be accepted soon!)