Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
By Md Emran Mazumder Ottawa University Student no:
Military and Overseas Voters – Ready for the General Election! September 2014 Brad King Co-Director, Indiana Election Division 2014 Election Administrators.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
A Pairing-Based Blind Signature
Digital Signatures and Hash Functions. Digital Signatures.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Election Observer Training 2008 Elections Certification & Training Program
The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
© VoteHere, Inc. All rights reserved. November 2004 VHTi Data Demonstration Andrew Berg Director, Engineering.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Static Validation of a Voting ProtocolSlide 1 Static Validation of a Voting Protocol Christoffer Rosenkilde Nielsen with Esben Heltoft Andersen and Hanne.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Civitas Toward a Secure Voting System AFRL Information Management Workshop October 22, 2010 Michael Clarkson Cornell University.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
Absentee Ballot Central Count General Introduction Step by step procedure Forms Tool Kit Dale Simmons, Co-General Counsel: (317) or (800)
Absentee Voting I.C. Title 34, Chapter 10. No Excuse Voting Any registered elector may vote absentee.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Bob can sign a message using a digital signature generation algorithm
Electronic Mail Security
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
UOCAVA Report Overview and Status July 2008 Andrew Regenscheid Computer Security Division National Institute of Standards and Technology.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Topic 22: Digital Schemes (2)
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Public Key Encryption.
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
A remote voting system based on Prêt à Voter coded by David Lundin Johannes Clos.
Digital Signatures, Message Digest and Authentication Week-9.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Internet Voting Ashok CS 395T. What is “E-voting” Thomas Edison received US patent number 90,646 for an electrographic vote recorder in Specific.
Prepared by Dr. Lamiaa Elshenawy
Political Process 3.6 Politics and Government. E- voting Electronic voting systems for electorates have been in use since the 1960s when punched card.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Computer and Network Security - Message Digests, Kerberos, PKI –
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Reporting Abstract Requirements and Procedures. New Reporting Requirement Official Abstract of Votes New form to be completed and submitted to the Secretary.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Network Security Celia Li Computer Science and Engineering York University.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
ThreeBallot, VAV, and Twin
How do Elections Work? Section 2 (pages ).
E-voting …and why it’s good..
CONFIDENCE IN COLORADO’S ELECTIONS
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
ISI Day – 20th Anniversary
eVoting System Proposal
Presentation transcript:

Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton

Motivation Current absentee ballot system requires a physical visit to the voting district authorities and one mailing or three mailings between voter and voting district authorities for every election Increase voter turnout of overseas military and citizens, disabled voters, out-of-state college students, younger citizens, traveling businessmen, etc. Increase confidence of election correctness by providing feedback to voters

Characteristics of a Secure Voting System CompletenessSoundnessPrivacyUnreusabilityEligibilityFairnessVerifiability

Threats to a Voting System Insider Attacks Denial of Service Vote Buying / Vote Coercion Virus

Cryptographic Functions Hash Digital Signature Blind Signature Verifiable Mixing Blind Commitment

Hash h = H(k 1, H(k 2, M) Used to ensure integrity of M Computationally infeasible to find a different values of M, k 1, or k 2 that yield the same hash output h k 1 and k 2 are random numbers to increase the strength of the resulting hash

Digital Signature Provides authentication and integrity Using RSA, signature C of H(M) using secret key d by C = H(M) d mod n Verify C by public key e by H(M) = C e mod n H(M) = C e mod n H(M) is hash of message M

Blind Signature Allows trusted authority to sign data that it can not see Encrypt message using random number k and trusted authority’s public key e by B = Mk e mod n B = Mk e mod n Authority signs with private key d by S = M d k mod n S = M d k mod n Blind signature extracted with k by C = (S / k) mod n = M d mod n

Verifiable Mixing Shuffle a list of encrypted data and pass it on to a second authority Second authority has no way to construct original order Any party can confirm all the original, unmodified data is present in the shuffled data, and no extra data was added No one but the shuffler has access to original list

Blind Commitment Prove to an authority that data has been created and fixed without supplying the data itself Data owner creates two random keys and calculates the hash h = H(k 1 || k 2 || M) Data owner sends k 2 and h to authority for safe keeping Data owner sends k 1 and M when data must be revealed and verified

Existing Systems Traditional (PCOS) Direct Record Electronic (DRE) Absentee VoteHere VHTi SERVE EVOX with Multiple Administrators

Traditional (PCOS) Precinct Counted Optical Scan Voter fills in circles on paper ballot Takes completed ballot to optical scanner in a sleeve Voter inserts paper ballot into scanner Optical scanner records are transported to central district for processing

Direct Record Electronic Ballot stored electronically, no paper ballot used Often use touch screens or push buttons Paper records may be printed internally during or after an election, but are not subject to voter verification Results usually reported on an electronic memory module or via modem

Absentee Registration requires a physical visit to the voting authority or a two-way mailing. Ballot and return envelopes are mailed prior to election. Voter completes ballot, encases it in an inner envelope, then mails it to the voting authority in an outer envelope up to the Saturday before Election Day. Voting officials open the outer envelope, shuffle inner envelopes, then remove and process ballots.

EVOX with Multiple Administrators Extension of EVOX system Reduces threat of insider attacks More than half of the available Administrators must validate each voter Commissioner Manager Administrators Anonymizer Tallying Server Voter Voter Voter

VoteHere VHTi DRE system Creates paper receipt for voter after casting the ballot Voter may verify that his/her ballot was correctly received by officials Anyone can verify correct tabulation of results

Generate receipt Unblind and decode results Choose columns for non-selections VoteHere Receipt Example AlBob Clive Dan Al Bob Clive Dan 0,4 3,5 2,2 4,1 NoNo Yes No Choose column for selection Blinded and committed ballot

SERVE Secure Electronic Registration and Voting Experiment intended for trials in 2004 election Developed as part of Federal Voting and Assistance Program (FVAP) Ruled too insecure by Security Peer Review Group Used Internet for transmissions and heavy use of public key cryptography

Proposed System SERVE’s cryptography EVOX with Multiple Administrators’ structure VoteHere’s public audit mechanisms Bootable CD and modem pool for increased security Commissioner Manager Administrators Anonymizer Tallying Server Modem Pool Voter Voter Voter

Registration Similar to absentee registration Propose allowing voters to establish a window for remote voting

Bootable CD Self-contained, minimal operating system and ballot information Private key and unique voter ID mailed with CD Mailed to voters several weeks ahead of time Voter may use CD to vote up until the Saturday before Election Day

Modem Pool Provides bridge between voting PCs and servers Compared to Internet, more resistant to Spoofing Spoofing DoS DoS Eavesdropping Eavesdropping

Administrators Maintains list of voter IDs, voter public keys, and optionally ballot type information (district, party, etc.) Each administrator receives a message for the blind commitment of the voter’s ballot E KAi+ (V, E KV- (H(k 1,i || k 2,i || B), k 2,i )) Commits and returns ticket to voter E KV- (E KT+ (E KAi- (H(k 1,i || k 2,i || B), k 2,i, D)))

Manager Signs list of administrators a voter used to validate the ballot Does not know which administrators were used Only signs one list per voter ID Voter sends E KM+ (V, E V- ( H(A||k 1,1 ||…||k 1,n ))) Returned ticket is E V+ (E KM- (H(A||k 1,1 ||…||k 1,n )))

Anonymizer Voter sends completed ballot, verification tickets, and keys to unblind data E KANON+ (V, E KV- (B, E KT+ (E KM- (H(A || k 1,1 || … || k 1,n )), E KT+ (E KA1- (H(k 1,1 || k 2,1 || B), k 2,1, D)),..., E KT+ (E KAn- (H(k 1,n || k 2,n || B), k 2,n, D)), k B, k 1,1,... k 1,n, A))))

Anonymizer Anonymizer uses the list of voter IDs and public keys to decrypt the message. It creates a list of voter IDs and partially unblinded ballots (B) for publication on the web. It creates a list of B’s and the tallying server tickets, shuffles via verifiable mixing, and moves the list to the tallying server.

Tallying Server Ballot data from Anonymizer has the form B, E KT+ (E KM- (H(A || k 1,1 || … || k 1,n )), E KT+ (E KA1- (H(k 1,1 || k 2,1 || B), k 2,1, D)),..., E KT+ (E KAn- (H(k 1,n || k 2,n || B), k 2,n, D)), k B, k 1,1,... k 1,n, A))) All information present is protected by the tallying server’s public key, and no information about the specific voter is needed to decrypt, unblind, or verify data.

Tallying Server Tallying server uses Administrator keys and supplies data to confirm the following: More than half of the Administrators signed the ballot. More than half of the Administrators signed the ballot. The Manager signed a list that matches the Administrator tickets submitted. The Manager signed a list that matches the Administrator tickets submitted. The voter submitted the appropriate type of ballot. The voter submitted the appropriate type of ballot. The allowed number of selections for each question was not exceeded. The allowed number of selections for each question was not exceeded. Unblinded ballots are converted to strings of “yes” or “no” and published to the web for public viewing.

Implementation Initially target overseas military and citizens (est. 6,000,000) Create option for domestic voters System scales linearly as number of voters increases

Conclusion Reduces number of communication steps between voting authorities and voters prior to the election Increases voting availability to several demographics Provides a more secure system than the prior systems Allows more voters to confirm accuracy of election process, generating confidence in the system