SlideShare a Scribd company logo
1 of 29
The ruling of the German Federal
Constitutional Court and its
technical consequences on eVoting
Alexander Prosser
http://e-voting.at

A real issue:

Finland 2008: ~ 200 evotes “disappeared”,
     election had to be repeated on paper


           Step              Step           Step           Step




                     Audit          Audit          Audit




=> Could indicate failure in audit trail
                                                                  2
http://e-voting.at


U.K. 2007: Software support staff manually
     edited ballots as they would not fit into the counting
     software. Key processes were performed on vendor-
     supplied notebook computers by support staff

ibid: Unaccounted data transfers by USB sticks during
     the ongoing election


     => Loss of control by election authorities ?

                                                       3
http://e-voting.at


Austria 2009: Head of election committee at student
      union elections boarded a fire fighting vehicle
      accompanied by an armed guard to take computer
      disks to erasure.
      Data could have allowed match voter – vote.*

ibid: Independent recount was not possible
      “We are at the mercy of the technicians”
      “I am convinced, I believe them”*

* derstandard.at 24.6.2009, my translation
                                                        4
http://e-voting.at




How can something inherently unobservable be

made observable and hence auditable ?




                                               5
http://e-voting.at




© futurezone.orf.at 28.5.2009 (c) Günther Hack

                                                 6
http://e-voting.at




© futurezone.orf.at 28.5.2009 (c) Günther Hack

                                                 7
http://e-voting.at




© futurezone.orf.at 28.5.2009 (c) Günther Hack

                                                 8
http://e-voting.at

Germany: Federal elections 2005,
     ~2m voters cast votes with election terminals in
     polling stations. Complaints alleged massive lack of
     auditability,


     that voters were unable to verify that their votes
     were counted correctly,


     that the Public was not able to follow election
     procedures.
                                                          9
http://e-voting.at

BMI: Public could observe how election
     staff copied the result computed by the machine into
     their tally.
     Also, machines were certified by PTB, Berlin

Complaints: Neither source code nor certification report
     were published


The certification report for the Austrian student union pilot was not
    published.
U.K. typically publishes such reports, recently also the U.S.
                                                                10
http://e-voting.at

Court Ruling:


     - Barred the voting terminals used


     - Decree enabling their use nullified


     - Voter must reliably ascertain that his vote was
       counted and included in the tally correctly



                                                     11
http://e-voting.at

Court did not pursue the complaints regarding
       publication of source code and certification report
       => They do “not decisively contribute to achieve
       the constitutional level of verifiability and
       reproducibility of the election results”*

Contradicts the mainstream in evoting community.

=> The election, not the software has to be auditable

* my translation



                                                       12
http://e-voting.at




        What does this mean for Internet voting ?




                                                    13
http://e-voting.at

 “Voter must reliably ascertain that his vote
 was counted and included in the tally correctly”



  Individual verification             Global verification



  Useless            Dangerous

Either you can verify how your vote
was counted or not.
                                                            14
http://e-voting.at

Voter must reliably ascertain that his vote
was counted and included in the tally correctly

       Global verification
       - Ballot box initially empty?
       - Can only authenticated voters vote?
       - Can they submit but one vote?
       - Only rightfully submitted votes in ballot box?
       - Ballot box under control of election committee?
       - No votes added to the count?
       - All votes counted?
       - Does election committee decide on how to count the votes?
       - ….
                                                                     15
http://e-voting.at

Manipulation protection:


       Who can manipulate what ?




                                   16
http://e-voting.at

  What?                A single vote   The votes of a   The entire
  Who?                                 unit (ward,      election
                                       constituency)
  A single entity                                       Worst case


  Coalition
  involving the
  voter
  Coalition      not
  involving election
  committee

  Coalition     with
  committee
  member/s

  The       election
  committee and
  resp. voter/s
                       Best case




                                                                     17
http://e-voting.at

Avoid common pitfalls:
1. Single point of manipulation
                     Public key of the ballot box


                                          Mixer

      Voter                  (1)

                Public key of the mixer

                               (2)



                                                    18
http://e-voting.at




                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)
                                          (3)
                Public key of the mixer

                               (2)



                                                    19
http://e-voting.at




                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)                    (5)
                                          (3)             (6)
                Public key of the mixer

                               (2)



                                                                20
http://e-voting.at

    The mixer‘s „election result“


                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)
                                          (3)
                Public key of the mixer

                               (2)



                                                    21
http://e-voting.at


                                                Suppressed

                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)
                                          (3)
                Public key of the mixer

                               (2)



                                                             22
http://e-voting.at




                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)                    (5)
                                          (3)             (6)
                Public key of the mixer

                               (2)



                                                                23
http://e-voting.at

Avoid common pitfalls:
2. Beware of the paper analogy




                                 24
http://e-voting.at




                 (1) Encryption




         (2) Digital
         signature




                       Encrypted
                         vote
  (3) Vote cast Digital signature



                                    25
http://e-voting.at




                 (1) Encryption




         (2) Digital
         signature                   (5) Transfer of authority




                                                  E-votes         Results
                       Encrypted
                         vote
                                                 (6) Decryption and counting
  (3) Vote cast Digital signature

            (4) Signature verification
                                                                            26
http://e-voting.at




                 (1) Encryption




         (2) Digital
         signature                   (5) Transfer of authority




                                                  E-votes         Results
                       Encrypted
                         vote
                                                 (6) Decryption and counting
  (3) Vote cast Digital signature

            (4) Signature verification
                                                                            27
http://e-voting.at


What is required ?

Independent verification of voting right

Authentication of ballots while maintaining
     voting secrecy
     => Requires anonymization of the vote
         before, not after submission

Control by the election committee

Independent recounts
                                              28
http://e-voting.at




Alexander Prosser
Univ. Economics and Business, Vienna
prosser@wu.ac.at
http://e-voting.at




                                       29

More Related Content

More from Danube University Krems, Centre for E-Governance

More from Danube University Krems, Centre for E-Governance (20)

#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
 
#CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities #CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities
 
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
 
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
 
DatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP projectDatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP project
 
Towards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice systemTowards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice system
 
[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES
 
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Using fuzzy cognitive maps as decision support tool for smart cities  goraczekUsing fuzzy cognitive maps as decision support tool for smart cities  goraczek
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
 
Understanding of smartphone divide dal yong
Understanding of smartphone divide  dal yongUnderstanding of smartphone divide  dal yong
Understanding of smartphone divide dal yong
 
The motivations behind open access publishing judith schossboeck
The motivations behind open access publishing  judith schossboeckThe motivations behind open access publishing  judith schossboeck
The motivations behind open access publishing judith schossboeck
 
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwakSocial media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
 
Social media and citizen engagement in asia skoric
Social media and citizen engagement in asia  skoricSocial media and citizen engagement in asia  skoric
Social media and citizen engagement in asia skoric
 
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulosRealizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
 
Post 2015 paris c limate conference politics on the internet manuela hartwig
Post 2015 paris c limate conference politics on the internet  manuela hartwigPost 2015 paris c limate conference politics on the internet  manuela hartwig
Post 2015 paris c limate conference politics on the internet manuela hartwig
 
Open government and national sovereignty ivo babaja
Open government and national sovereignty  ivo babajaOpen government and national sovereignty  ivo babaja
Open government and national sovereignty ivo babaja
 
Health r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chungHealth r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chung
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
 
GovCamp 2016 - Co-Creation
GovCamp 2016 - Co-CreationGovCamp 2016 - Co-Creation
GovCamp 2016 - Co-Creation
 
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
 
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

The ruling of the German Federal Constitutional Court and its technical consequences on eVoting

  • 1. The ruling of the German Federal Constitutional Court and its technical consequences on eVoting Alexander Prosser
  • 2. http://e-voting.at A real issue: Finland 2008: ~ 200 evotes “disappeared”, election had to be repeated on paper Step Step Step Step Audit Audit Audit => Could indicate failure in audit trail 2
  • 3. http://e-voting.at U.K. 2007: Software support staff manually edited ballots as they would not fit into the counting software. Key processes were performed on vendor- supplied notebook computers by support staff ibid: Unaccounted data transfers by USB sticks during the ongoing election => Loss of control by election authorities ? 3
  • 4. http://e-voting.at Austria 2009: Head of election committee at student union elections boarded a fire fighting vehicle accompanied by an armed guard to take computer disks to erasure. Data could have allowed match voter – vote.* ibid: Independent recount was not possible “We are at the mercy of the technicians” “I am convinced, I believe them”* * derstandard.at 24.6.2009, my translation 4
  • 5. http://e-voting.at How can something inherently unobservable be made observable and hence auditable ? 5
  • 9. http://e-voting.at Germany: Federal elections 2005, ~2m voters cast votes with election terminals in polling stations. Complaints alleged massive lack of auditability, that voters were unable to verify that their votes were counted correctly, that the Public was not able to follow election procedures. 9
  • 10. http://e-voting.at BMI: Public could observe how election staff copied the result computed by the machine into their tally. Also, machines were certified by PTB, Berlin Complaints: Neither source code nor certification report were published The certification report for the Austrian student union pilot was not published. U.K. typically publishes such reports, recently also the U.S. 10
  • 11. http://e-voting.at Court Ruling: - Barred the voting terminals used - Decree enabling their use nullified - Voter must reliably ascertain that his vote was counted and included in the tally correctly 11
  • 12. http://e-voting.at Court did not pursue the complaints regarding publication of source code and certification report => They do “not decisively contribute to achieve the constitutional level of verifiability and reproducibility of the election results”* Contradicts the mainstream in evoting community. => The election, not the software has to be auditable * my translation 12
  • 13. http://e-voting.at What does this mean for Internet voting ? 13
  • 14. http://e-voting.at “Voter must reliably ascertain that his vote was counted and included in the tally correctly” Individual verification Global verification Useless Dangerous Either you can verify how your vote was counted or not. 14
  • 15. http://e-voting.at Voter must reliably ascertain that his vote was counted and included in the tally correctly Global verification - Ballot box initially empty? - Can only authenticated voters vote? - Can they submit but one vote? - Only rightfully submitted votes in ballot box? - Ballot box under control of election committee? - No votes added to the count? - All votes counted? - Does election committee decide on how to count the votes? - …. 15
  • 16. http://e-voting.at Manipulation protection: Who can manipulate what ? 16
  • 17. http://e-voting.at What? A single vote The votes of a The entire Who? unit (ward, election constituency) A single entity Worst case Coalition involving the voter Coalition not involving election committee Coalition with committee member/s The election committee and resp. voter/s Best case 17
  • 18. http://e-voting.at Avoid common pitfalls: 1. Single point of manipulation Public key of the ballot box Mixer Voter (1) Public key of the mixer (2) 18
  • 19. http://e-voting.at Public key of the ballot box Mixer (4) Voter (1) (3) Public key of the mixer (2) 19
  • 20. http://e-voting.at Public key of the ballot box Mixer (4) Voter (1) (5) (3) (6) Public key of the mixer (2) 20
  • 21. http://e-voting.at The mixer‘s „election result“ Public key of the ballot box Mixer (4) Voter (1) (3) Public key of the mixer (2) 21
  • 22. http://e-voting.at Suppressed Public key of the ballot box Mixer (4) Voter (1) (3) Public key of the mixer (2) 22
  • 23. http://e-voting.at Public key of the ballot box Mixer (4) Voter (1) (5) (3) (6) Public key of the mixer (2) 23
  • 24. http://e-voting.at Avoid common pitfalls: 2. Beware of the paper analogy 24
  • 25. http://e-voting.at (1) Encryption (2) Digital signature Encrypted vote (3) Vote cast Digital signature 25
  • 26. http://e-voting.at (1) Encryption (2) Digital signature (5) Transfer of authority E-votes Results Encrypted vote (6) Decryption and counting (3) Vote cast Digital signature (4) Signature verification 26
  • 27. http://e-voting.at (1) Encryption (2) Digital signature (5) Transfer of authority E-votes Results Encrypted vote (6) Decryption and counting (3) Vote cast Digital signature (4) Signature verification 27
  • 28. http://e-voting.at What is required ? Independent verification of voting right Authentication of ballots while maintaining voting secrecy => Requires anonymization of the vote before, not after submission Control by the election committee Independent recounts 28
  • 29. http://e-voting.at Alexander Prosser Univ. Economics and Business, Vienna prosser@wu.ac.at http://e-voting.at 29