Cryptography and Voting

B
Ben AdidaResearch Faculty at Harvard University
Cryptography
 and Voting
     Ben Adida
   Harvard University

    EVT & WOTE
   August 11th, 2009
   Montreal, Canada
“If you think
   cryptography
  is the solution
to your problem....

         2
... then you
don’t understand
 cryptography...




       3
... then you
don’t understand
 cryptography...
... and you don’t
understand your
     problem.”
  -Peter, Butler, Bruce
            3
Yet, cryptography solves
 problems that initially
appear to be impossible.

           4
There is a
potential paradigm shift.

       A means of
  election verification
   far more powerful
 than other methods.
            5
Three Points
1. Voting is a unique trust problem.
2. Cryptography is not just about secrets,
   it creates trust between competitors,
   it democratizes the auditing process.
3. Open-Audit Voting
   is closing in on practicality.


                    6
1.
Voting is a unique
 trust problem.


        7
“Swing Vote”

terrible movie.
hilarious ending.

        8
Wooten got the news from his wife, Roxanne,
  who went to City Hall on Wednesday
        to see the election results.

  "She saw my name with zero votes by it.
      She came home and asked me if
       I had voted for myself or not."



                     9
10
11
Bad Analogies

Dan Wallach’s great rump session talk.
More than that
ATMs and planes are vulnerable
(they are, but that’s not the point)
It’s that voting is much harder.


                  12
Bad Analogies
Adversaries
➡ pilots vs. passengers (airline is on your side, I think.)
➡ banking privacy is only voluntary:
  you are not the enemy.
Failure Detection & Recover
➡ plane crashes & statements vs. 2% election fraud
➡ Full banking receipts vs. destroying election evidence


Imagine
➡ a bank where you never get a receipt.
➡ an airline where the pilot is working against you.


                            13
Ballot secrecy
conflicts with auditing,
    cryptography
 can reconcile them.


           14
http://www.cs.uiowa.edu/~jones/voting/pictures/   15
16
/*          1
      * source
      * code
      */

     if (...

                     Vendor




16
/*          1
               * source
               * code
 Voting   2    */
Machine
              if (...

                              Vendor




  16
/*          1
                              * source
                              * code
 Polling        Voting        */
           3             2
Location       Machine
                             if (...

                                             Vendor




                 16
/*          1
                                  * source
                                  * code
     Polling        Voting        */
               3             2
    Location       Machine
                                 if (...

                                                 Vendor
        4

Alice




                     16
/*          1
                                  * source
                                  * code
     Polling        Voting        */
               3             2
    Location       Machine
                                 if (...

                                                 Vendor
        4

Alice




                     16
/*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice

               5


                       Ballot Box Collection




                                 16
/*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice
                                                                   Results
               5                                         6           .....


                       Ballot Box Collection




                                 16
/*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice
                                                                   Results
               5                                         6           .....


                       Ballot Box Collection
                            Black Box

                                 16
Chain of Custody
Chain of Custody
Chain of Custody
Chain of Custody
Chain of Custody
Initially,
  cryptographers
     re-created
 physical processes
in the digital arena.

          18
Then, a realization:
cryptography enables a
 new voting paradigm

Secrecy + Auditability.

           19
20
Public Ballots
   Bulletin Board


               Bob:
              McCain

         Carol:
         Obama




         21
Public Ballots
           Bulletin Board


                       Bob:
                      McCain

                 Carol:
                 Obama




Alice
                 21
Public Ballots
            Bulletin Board

         Alice:         Bob:
         Obama         McCain

                  Carol:
                  Obama




Alice
                  21
Public Ballots
            Bulletin Board

         Alice:         Bob:
         Obama         McCain

                  Carol:
                  Obama
                                  Tally

                                Obama....2
                                McCain....
Alice
                                   1
                  21
Encrypted Public Ballots
           Bulletin Board

        Alice:         Bob:
         Rice         Clinton

                 Carol:
                  Rice
                                  Tally

                                Obama....2
                                McCain....
Alice
                                   1
                 22
Encrypted Public Ballots
                        Bulletin Board

                    Alice:          Bob:
                     Rice          Clinton

                              Carol:
Ali                            Rice
   ce
        ver                                    Tally
            ifies
                   he
                     rv                      Obama....2
                       ote
                                             McCain....
Alice
                                                1
                              22
Encrypted Public Ballots
                        Bulletin Board

                    Alice:              Bob:
                     Rice              Clinton

                              Carol:
Ali
   ce                          Rice                            ta  lly
                                                             e
                                                            hTally
        ver
            ifi                                       ifie st
              es
                   he                        ne   ver
                     rv                ve ryo            Obama....2
                       ote         E
                                                         McCain....
Alice
                                                            1
                              22
End-to-End Verification
End-to-End Verification
                       /*
                        * source
                        * code
              Voting    */
             Machine
                       if (...

                                   Vendor

   Polling
  Location
End-to-End Verification
                                  /*
                                   * source
                                   * code
                Voting             */
               Machine
                                  if (...

                                              Vendor

                          Ballot Box /
     Polling             Bulletin Board
    Location




Alice
End-to-End Verification
                                  /*
                                   * source
                                   * code
                Voting             */
               Machine
                                  if (...

                                              Vendor

                          Ballot Box /             Results
     Polling             Bulletin Board
    Location                                           .....




Alice
End-to-End Verification
                                      /*
                                       * source
                                       * code
                    Voting             */
                   Machine
                                      if (...

                                                  Vendor

                              Ballot Box /             Results
     Polling                 Bulletin Board
    Location                                               .....




                  1
Alice
               Receipt
End-to-End Verification
                                      /*
                                       * source
                                       * code
                    Voting             */
                   Machine
                                      if (...

                                                      Vendor

                              Ballot Box /                 Results
     Polling                 Bulletin Board
    Location                                                   .....




                  1                               2
Alice
               Receipt
Democratizing Audits
Each voter is responsible for checking
their receipt (no one else can.)
Anyone, a voter or a public org,
can audit the tally and
verify the list of cast ballots.
Thus, OPEN-AUDIT Voting.


                   24
2.
   Cryptography is
not just about secrets,
creates trust between
     competitors.

           25
NO!
Increased transparency
   when some data
  must remain secret.
          26
So, yes, we encrypt,
and then we operate on the
encrypted data in public, so
     everyone can see.

In particular, because the vote
  is encrypted, it can remain
  labeled with voter’s name.
               27
“Randomized” Encryption




           28
“Randomized” Encryption
Keypair consists of a public key pk and a secret key sk .




                           28
“Randomized” Encryption
Keypair consists of a public key pk and a secret key sk .

          "Obama"         Enc pk       8b5637




                           28
“Randomized” Encryption
Keypair consists of a public key pk and a secret key sk .

          "Obama"         Enc pk       8b5637



          "McCain"        Enc pk       c5de34




                           28
“Randomized” Encryption
Keypair consists of a public key pk and a secret key sk .

          "Obama"         Enc pk       8b5637



          "McCain"        Enc pk       c5de34



          "Obama"        Enc pk        a4b395


                           28
Threshold Decryption
      Secret key is shared amongst multiple parties:
all (or at least a quorum) need to cooperate to decrypt.




     8b5637




                           29
Threshold Decryption
      Secret key is shared amongst multiple parties:
all (or at least a quorum) need to cooperate to decrypt.

                 Dec sk1    b739cb



     8b5637




                           29
Threshold Decryption
      Secret key is shared amongst multiple parties:
all (or at least a quorum) need to cooperate to decrypt.

                 Dec sk1    b739cb

                 Dec sk2    261ad7
     8b5637




                           29
Threshold Decryption
      Secret key is shared amongst multiple parties:
all (or at least a quorum) need to cooperate to decrypt.

                 Dec sk1    b739cb

                 Dec sk2    261ad7
     8b5637
                 Dec sk3    7231bc




                           29
Threshold Decryption
      Secret key is shared amongst multiple parties:
all (or at least a quorum) need to cooperate to decrypt.

                 Dec sk1    b739cb

                 Dec sk2    261ad7
     8b5637
                 Dec sk3    7231bc

                 Dec sk4    8239ba


                           29
Threshold Decryption
      Secret key is shared amongst multiple parties:
all (or at least a quorum) need to cooperate to decrypt.

                 Dec sk1    b739cb

                 Dec sk2    261ad7
     8b5637                                  "Obama"
                 Dec sk3    7231bc

                 Dec sk4    8239ba


                           29
Homomorphic
 Encryption




     30
Homomorphic
      Encryption
Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 )




                30
Homomorphic
      Encryption
Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 )




                30
Homomorphic
      Encryption
Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 )

      g   m1
               ×g   m2
                          = g   m 1 +m 2




                     30
Homomorphic
      Encryption
Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 )

      g   m1
               ×g   m2
                          = g   m 1 +m 2


         then we can simply
  add “under cover” of encryption!

                     30
Mixnets



c = Encpk1 (Encpk2 (Encpk3 (m)))
          Each mix server “unwraps”
       a layer of this encryption onion.

                      31
Proving certain details while
   keeping others secret.

   Proving a ciphertext
 encodes a given message
    without revealing
    its random factor.
              32
Zero-Knowledge Proof




         33
Zero-Knowledge Proof
                  President:
                    President:
                 Mickey Mouse
                     President:
                  Mickey Mouse
                       President:
                    Mickey Mouse
                        President:
                     Mickey Mouse
                          President:
                       Mickey Mouse
                           Vote For:
                        Mickey Mouse
                           Obama
Vote For:
 Obama




            33
Zero-Knowledge Proof
                                       President:
                                         President:
                                      Mickey Mouse
                                          President:
                                       Mickey Mouse
                                            President:
                                         Mickey Mouse
                                             President:
                                          Mickey Mouse
                                               President:
                                            Mickey Mouse
                                                Vote For:
                                             Mickey Mouse
                                                Obama
Vote For:
 Obama




                This last envelope
            likely contains “Obama”

                      33
Zero-Knowledge Proof
    President:                 President:
      President:
   Mickey Mouse                  President:
                              Mickey Mouse
       President:
    Mickey Mouse                  President:
                               Mickey Mouse
         President:
      Mickey Mouse                  President:
                                 Mickey Mouse
          President:
       Mickey Mouse                  President:
                                  Mickey Mouse
            President:
         Mickey Mouse                  President:
                                    Mickey Mouse
             Vote For:
          Mickey Mouse                  Vote For:
                                     Mickey Mouse
             Obama                      McCain
                                         Paul




    Open envelopes don’t prove
      anything after the fact.

                         34
Electronic Experience
                                      Voter interacts with a voting
                                      machine
Voting Machine
                              Alice
                                      Obtains a freshly printed receipt
                                      that displays the encrypted ballot
             Encrypted Vote

                                      Takes the receipt home and uses it
                                      as a tracking number.
                                      Receipts posted for public tally.


                                             35
Paper Experience
                            David
                            Adam
                                Bob
                           Charlie
    David _______
    Adam _______
     Bob _______                                Pre-print paper ballots with some
                                                indirection betw candidate and choice
 Charlie _______
                           _______
               8c3sw
                           _______
                           _______
                           _______
                                8c3sw
                                                Break the indirection (tear, detach)
                        Adam - x
                                      8c3sw
                                                for effective encryption
                         Bob - q
                       Charlie - r
                        David - m               Take receipt home and use it
 Adam - x
  Bob - q
              8c3sw
                                                as tracking number.
Charlie - r

q
q
 David - m
     r
     r   m
         m     x
               x
                                        8c3sw
                                                Receipts posted for public tally.

                       q    r     m      x




                                                       36
3.
Cryptography-based Voting
    (Open-Audit Voting)
is closing in on practicality.


              37
Benaloh Casting




       38
Benaloh Casting
Alice




        38
Benaloh Casting
        "Obama"


Alice




             38
Benaloh Casting
        "Obama"

        Encrypted
          Ballot
Alice




                38
Benaloh Casting
                "Obama"

                Encrypted
                  Ballot
        Alice




Alice




                        38
Benaloh Casting
                     "Obama"

                     Encrypted
                       Ballot
             Alice



        "AUDIT"


Alice




                             38
Benaloh Casting
                       "Obama"

                       Encrypted
                         Ballot
               Alice



        "AUDIT"
         Decrypted
           Ballot
Alice




                               38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"
           Decrypted
             Ballot
Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"
           Decrypted
             Ballot
Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"
           Decrypted
             Ballot
Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"
           Decrypted
             Ballot
Alice                                           Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"                                         "CAST"
           Decrypted
             Ballot
Alice                                           Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"                                         "CAST"
           Decrypted                                      Signed
             Ballot                                      Encrypted
                                                           Ballot
Alice                                           Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"                                         "CAST"
           Decrypted                                      Signed
             Ballot                                      Encrypted
                                                           Ballot
Alice                                           Alice

        Encrypted      Decrypted
          Ballot         Ballot




            VERIFICATION
                                                Alice




                                           38
Benaloh Casting
                                   "Obama"

                                   Encrypted
                                     Ballot
                    Alice



        "AUDIT"                                         "CAST"
           Decrypted                                      Signed
             Ballot                                      Encrypted
                                                           Ballot
Alice                                           Alice

        Encrypted      Decrypted
          Ballot         Ballot
                                                         Signed
                                                        Encrypted
                                                          Ballot

            VERIFICATION
                                                Alice




                                           38
Many more great ideas
Neff ’s MarkPledge
➡   high-assurance, human-verifiable, proofs of correct encryption
Scantegrity
➡   closely mirrors opscan voting
ThreeBallot by Rivest
➡   teaching the concept of open-audit without deep crypto
STV: Ramchen, Teague, Benaloh & Moran.
➡   handling complex election styles
Prêt-à-Voter by Ryan et al.
➡   elegant, simple, paper-based
                               39
Deployments!

UCL (25,000 voters)
Scantegrity @ Takoma Park
SCV




                 40
Three Points
1. Voting is a unique trust problem.
2. Cryptography is not just about secrets,
   it creates trust between competitors,
   it democratizes the auditing process.
3. Open-Audit Voting
   is closing in on practicality.


                    41
My Fear:
 computerization of
 voting is inevitable.
without open-audit,
the situation is grim.
          42
My Hope:
  proofs for auditing
    partially-secret
processes will soon be
as common as public-
  key crypto is now.
          43
Challenge:




Ed Felten: “you have no voter privacy, deal with it.”


                          44
Challenge:




Ed Felten: “you have no voter privacy, deal with it.”


                          44
Questions?
    45
1 of 98

Recommended

Voting Security Overview by
Voting Security OverviewVoting Security Overview
Voting Security OverviewBen Adida
1.6K views83 slides
Truly Verifiable Elections by
Truly Verifiable ElectionsTruly Verifiable Elections
Truly Verifiable ElectionsBen Adida
2.7K views50 slides
Secure Voting by
Secure VotingSecure Voting
Secure VotingBen Adida
1.7K views65 slides
Helios - Real-World Open-Audit Voting by
Helios - Real-World Open-Audit VotingHelios - Real-World Open-Audit Voting
Helios - Real-World Open-Audit VotingBen Adida
3.9K views79 slides
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti... by
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...Cyber Security Alliance
1.1K views41 slides
Open-Audit Voting by
Open-Audit VotingOpen-Audit Voting
Open-Audit VotingBen Adida
1.7K views152 slides

More Related Content

Viewers also liked

Efficient Receipt-Free Ballot Casting Resistant to Covert Channels by
Efficient Receipt-Free Ballot Casting Resistant to Covert ChannelsEfficient Receipt-Free Ballot Casting Resistant to Covert Channels
Efficient Receipt-Free Ballot Casting Resistant to Covert ChannelsBen Adida
1.7K views32 slides
How to Build an Indivo X Personal Health App by
How to Build an Indivo X Personal Health AppHow to Build an Indivo X Personal Health App
How to Build an Indivo X Personal Health AppBen Adida
2.3K views39 slides
Helios: web-based truly verifiable voting by
Helios: web-based truly verifiable votingHelios: web-based truly verifiable voting
Helios: web-based truly verifiable votingBen Adida
1.5K views20 slides
Bitcoin by
BitcoinBitcoin
Bitcoinmahdi ataeyan
3.5K views57 slides
Biometrics Iris Scanning: A Literature Review by
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
9.9K views10 slides
Sigma Protocols and Zero Knowledge by
Sigma Protocols and Zero KnowledgeSigma Protocols and Zero Knowledge
Sigma Protocols and Zero KnowledgeAlex Chepurnoy
2.1K views26 slides

Viewers also liked(16)

Efficient Receipt-Free Ballot Casting Resistant to Covert Channels by Ben Adida
Efficient Receipt-Free Ballot Casting Resistant to Covert ChannelsEfficient Receipt-Free Ballot Casting Resistant to Covert Channels
Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
Ben Adida1.7K views
How to Build an Indivo X Personal Health App by Ben Adida
How to Build an Indivo X Personal Health AppHow to Build an Indivo X Personal Health App
How to Build an Indivo X Personal Health App
Ben Adida2.3K views
Helios: web-based truly verifiable voting by Ben Adida
Helios: web-based truly verifiable votingHelios: web-based truly verifiable voting
Helios: web-based truly verifiable voting
Ben Adida1.5K views
Biometrics Iris Scanning: A Literature Review by Olivia Moran
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
Olivia Moran9.9K views
Sigma Protocols and Zero Knowledge by Alex Chepurnoy
Sigma Protocols and Zero KnowledgeSigma Protocols and Zero Knowledge
Sigma Protocols and Zero Knowledge
Alex Chepurnoy2.1K views
Iris by @run@$uj! final by ARUNASUJITHA
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA1.8K views
Secure e voting system by Monira Monir
Secure e voting systemSecure e voting system
Secure e voting system
Monira Monir5.8K views
Public Key Algorithms by Bit Hacker
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
Bit Hacker4.8K views
Elliptic Curve Cryptography and Zero Knowledge Proof by Arunanand Ta
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta6K views
Online voting job presentation by bondito
Online voting job presentationOnline voting job presentation
Online voting job presentation
bondito1.1K views
Visual Design with Data by Seth Familian
Visual Design with DataVisual Design with Data
Visual Design with Data
Seth Familian2.9M views
TEDx Manchester: AI & The Future of Work by Volker Hirsch
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
Volker Hirsch902.3K views

Recently uploaded

AMAZON PRODUCT RESEARCH.pdf by
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdfJerikkLaureta
26 views13 slides
Unit 1_Lecture 2_Physical Design of IoT.pdf by
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfStephenTec
12 views36 slides
Design Driven Network Assurance by
Design Driven Network AssuranceDesign Driven Network Assurance
Design Driven Network AssuranceNetwork Automation Forum
15 views42 slides
Voice Logger - Telephony Integration Solution at Aegis by
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
39 views1 slide
Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 views68 slides
Case Study Copenhagen Energy and Business Central.pdf by
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 views3 slides

Recently uploaded(20)

AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri16 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva

Cryptography and Voting

  • 1. Cryptography and Voting Ben Adida Harvard University EVT & WOTE August 11th, 2009 Montreal, Canada
  • 2. “If you think cryptography is the solution to your problem.... 2
  • 3. ... then you don’t understand cryptography... 3
  • 4. ... then you don’t understand cryptography... ... and you don’t understand your problem.” -Peter, Butler, Bruce 3
  • 5. Yet, cryptography solves problems that initially appear to be impossible. 4
  • 6. There is a potential paradigm shift. A means of election verification far more powerful than other methods. 5
  • 7. Three Points 1. Voting is a unique trust problem. 2. Cryptography is not just about secrets, it creates trust between competitors, it democratizes the auditing process. 3. Open-Audit Voting is closing in on practicality. 6
  • 8. 1. Voting is a unique trust problem. 7
  • 10. Wooten got the news from his wife, Roxanne, who went to City Hall on Wednesday to see the election results. "She saw my name with zero votes by it. She came home and asked me if I had voted for myself or not." 9
  • 11. 10
  • 12. 11
  • 13. Bad Analogies Dan Wallach’s great rump session talk. More than that ATMs and planes are vulnerable (they are, but that’s not the point) It’s that voting is much harder. 12
  • 14. Bad Analogies Adversaries ➡ pilots vs. passengers (airline is on your side, I think.) ➡ banking privacy is only voluntary: you are not the enemy. Failure Detection & Recover ➡ plane crashes & statements vs. 2% election fraud ➡ Full banking receipts vs. destroying election evidence Imagine ➡ a bank where you never get a receipt. ➡ an airline where the pilot is working against you. 13
  • 15. Ballot secrecy conflicts with auditing, cryptography can reconcile them. 14
  • 17. 16
  • 18. /* 1 * source * code */ if (... Vendor 16
  • 19. /* 1 * source * code Voting 2 */ Machine if (... Vendor 16
  • 20. /* 1 * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 16
  • 21. /* 1 * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice 16
  • 22. /* 1 * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice 16
  • 23. /* 1 * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice 5 Ballot Box Collection 16
  • 24. /* 1 * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice Results 5 6 ..... Ballot Box Collection 16
  • 25. /* 1 * source * code Polling Voting */ 3 2 Location Machine if (... Vendor 4 Alice Results 5 6 ..... Ballot Box Collection Black Box 16
  • 31. Initially, cryptographers re-created physical processes in the digital arena. 18
  • 32. Then, a realization: cryptography enables a new voting paradigm Secrecy + Auditability. 19
  • 33. 20
  • 34. Public Ballots Bulletin Board Bob: McCain Carol: Obama 21
  • 35. Public Ballots Bulletin Board Bob: McCain Carol: Obama Alice 21
  • 36. Public Ballots Bulletin Board Alice: Bob: Obama McCain Carol: Obama Alice 21
  • 37. Public Ballots Bulletin Board Alice: Bob: Obama McCain Carol: Obama Tally Obama....2 McCain.... Alice 1 21
  • 38. Encrypted Public Ballots Bulletin Board Alice: Bob: Rice Clinton Carol: Rice Tally Obama....2 McCain.... Alice 1 22
  • 39. Encrypted Public Ballots Bulletin Board Alice: Bob: Rice Clinton Carol: Ali Rice ce ver Tally ifies he rv Obama....2 ote McCain.... Alice 1 22
  • 40. Encrypted Public Ballots Bulletin Board Alice: Bob: Rice Clinton Carol: Ali ce Rice ta lly e hTally ver ifi ifie st es he ne ver rv ve ryo Obama....2 ote E McCain.... Alice 1 22
  • 42. End-to-End Verification /* * source * code Voting */ Machine if (... Vendor Polling Location
  • 43. End-to-End Verification /* * source * code Voting */ Machine if (... Vendor Ballot Box / Polling Bulletin Board Location Alice
  • 44. End-to-End Verification /* * source * code Voting */ Machine if (... Vendor Ballot Box / Results Polling Bulletin Board Location ..... Alice
  • 45. End-to-End Verification /* * source * code Voting */ Machine if (... Vendor Ballot Box / Results Polling Bulletin Board Location ..... 1 Alice Receipt
  • 46. End-to-End Verification /* * source * code Voting */ Machine if (... Vendor Ballot Box / Results Polling Bulletin Board Location ..... 1 2 Alice Receipt
  • 47. Democratizing Audits Each voter is responsible for checking their receipt (no one else can.) Anyone, a voter or a public org, can audit the tally and verify the list of cast ballots. Thus, OPEN-AUDIT Voting. 24
  • 48. 2. Cryptography is not just about secrets, creates trust between competitors. 25
  • 49. NO! Increased transparency when some data must remain secret. 26
  • 50. So, yes, we encrypt, and then we operate on the encrypted data in public, so everyone can see. In particular, because the vote is encrypted, it can remain labeled with voter’s name. 27
  • 52. “Randomized” Encryption Keypair consists of a public key pk and a secret key sk . 28
  • 53. “Randomized” Encryption Keypair consists of a public key pk and a secret key sk . "Obama" Enc pk 8b5637 28
  • 54. “Randomized” Encryption Keypair consists of a public key pk and a secret key sk . "Obama" Enc pk 8b5637 "McCain" Enc pk c5de34 28
  • 55. “Randomized” Encryption Keypair consists of a public key pk and a secret key sk . "Obama" Enc pk 8b5637 "McCain" Enc pk c5de34 "Obama" Enc pk a4b395 28
  • 56. Threshold Decryption Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt. 8b5637 29
  • 57. Threshold Decryption Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt. Dec sk1 b739cb 8b5637 29
  • 58. Threshold Decryption Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt. Dec sk1 b739cb Dec sk2 261ad7 8b5637 29
  • 59. Threshold Decryption Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt. Dec sk1 b739cb Dec sk2 261ad7 8b5637 Dec sk3 7231bc 29
  • 60. Threshold Decryption Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt. Dec sk1 b739cb Dec sk2 261ad7 8b5637 Dec sk3 7231bc Dec sk4 8239ba 29
  • 61. Threshold Decryption Secret key is shared amongst multiple parties: all (or at least a quorum) need to cooperate to decrypt. Dec sk1 b739cb Dec sk2 261ad7 8b5637 "Obama" Dec sk3 7231bc Dec sk4 8239ba 29
  • 63. Homomorphic Encryption Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 ) 30
  • 64. Homomorphic Encryption Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 ) 30
  • 65. Homomorphic Encryption Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 ) g m1 ×g m2 = g m 1 +m 2 30
  • 66. Homomorphic Encryption Enc(m1 ) × Enc(m2 ) = Enc(m1 + m2 ) g m1 ×g m2 = g m 1 +m 2 then we can simply add “under cover” of encryption! 30
  • 67. Mixnets c = Encpk1 (Encpk2 (Encpk3 (m))) Each mix server “unwraps” a layer of this encryption onion. 31
  • 68. Proving certain details while keeping others secret. Proving a ciphertext encodes a given message without revealing its random factor. 32
  • 70. Zero-Knowledge Proof President: President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse Vote For: Mickey Mouse Obama Vote For: Obama 33
  • 71. Zero-Knowledge Proof President: President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse Vote For: Mickey Mouse Obama Vote For: Obama This last envelope likely contains “Obama” 33
  • 72. Zero-Knowledge Proof President: President: President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse President: Mickey Mouse Vote For: Mickey Mouse Vote For: Mickey Mouse Obama McCain Paul Open envelopes don’t prove anything after the fact. 34
  • 73. Electronic Experience Voter interacts with a voting machine Voting Machine Alice Obtains a freshly printed receipt that displays the encrypted ballot Encrypted Vote Takes the receipt home and uses it as a tracking number. Receipts posted for public tally. 35
  • 74. Paper Experience David Adam Bob Charlie David _______ Adam _______ Bob _______ Pre-print paper ballots with some indirection betw candidate and choice Charlie _______ _______ 8c3sw _______ _______ _______ 8c3sw Break the indirection (tear, detach) Adam - x 8c3sw for effective encryption Bob - q Charlie - r David - m Take receipt home and use it Adam - x Bob - q 8c3sw as tracking number. Charlie - r q q David - m r r m m x x 8c3sw Receipts posted for public tally. q r m x 36
  • 75. 3. Cryptography-based Voting (Open-Audit Voting) is closing in on practicality. 37
  • 78. Benaloh Casting "Obama" Alice 38
  • 79. Benaloh Casting "Obama" Encrypted Ballot Alice 38
  • 80. Benaloh Casting "Obama" Encrypted Ballot Alice Alice 38
  • 81. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" Alice 38
  • 82. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" Decrypted Ballot Alice 38
  • 83. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" Decrypted Ballot Alice Encrypted Decrypted Ballot Ballot VERIFICATION 38
  • 84. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" Decrypted Ballot Alice Encrypted Decrypted Ballot Ballot VERIFICATION 38
  • 85. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" Decrypted Ballot Alice Encrypted Decrypted Ballot Ballot VERIFICATION 38
  • 86. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" Decrypted Ballot Alice Alice Encrypted Decrypted Ballot Ballot VERIFICATION 38
  • 87. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" "CAST" Decrypted Ballot Alice Alice Encrypted Decrypted Ballot Ballot VERIFICATION 38
  • 88. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" "CAST" Decrypted Signed Ballot Encrypted Ballot Alice Alice Encrypted Decrypted Ballot Ballot VERIFICATION 38
  • 89. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" "CAST" Decrypted Signed Ballot Encrypted Ballot Alice Alice Encrypted Decrypted Ballot Ballot VERIFICATION Alice 38
  • 90. Benaloh Casting "Obama" Encrypted Ballot Alice "AUDIT" "CAST" Decrypted Signed Ballot Encrypted Ballot Alice Alice Encrypted Decrypted Ballot Ballot Signed Encrypted Ballot VERIFICATION Alice 38
  • 91. Many more great ideas Neff ’s MarkPledge ➡ high-assurance, human-verifiable, proofs of correct encryption Scantegrity ➡ closely mirrors opscan voting ThreeBallot by Rivest ➡ teaching the concept of open-audit without deep crypto STV: Ramchen, Teague, Benaloh & Moran. ➡ handling complex election styles Prêt-à-Voter by Ryan et al. ➡ elegant, simple, paper-based 39
  • 93. Three Points 1. Voting is a unique trust problem. 2. Cryptography is not just about secrets, it creates trust between competitors, it democratizes the auditing process. 3. Open-Audit Voting is closing in on practicality. 41
  • 94. My Fear: computerization of voting is inevitable. without open-audit, the situation is grim. 42
  • 95. My Hope: proofs for auditing partially-secret processes will soon be as common as public- key crypto is now. 43
  • 96. Challenge: Ed Felten: “you have no voter privacy, deal with it.” 44
  • 97. Challenge: Ed Felten: “you have no voter privacy, deal with it.” 44