35

Shaar e voting using cdma

Embed Size (px)

Citation preview

Page 1: Shaar e voting using cdma
Page 2: Shaar e voting using cdma

Main points1. Introduction

3. The proposed system

5. Feasibility aspects of the proposed system

7. Conclusions

Page 3: Shaar e voting using cdma

Introduction -1

Page 4: Shaar e voting using cdma

Security is a very important factor in designing e-voting systems.

Code Division Multiple Access CDMA has never been used to provide security to e-voting systems.

Page 5: Shaar e voting using cdma

This paper suggests a new secure e-voting system depending on CDMA, which could be better than the others for certain situations.

I hope that your comments will trigger a comparison study.

Page 6: Shaar e voting using cdma

The system is based on generating a binary CDMA set of codes, in which the crosscorrelation spectrum is the same for all pairs of codes belonging to the set.

Page 7: Shaar e voting using cdma

If one of these codes is assigned to the election committee (person pt) and each eligible voter is assigned a distinct code of this set (other than that of the committee), we in the election committee center, can make sure that the received code belongs to the set by checking its crosscorrelation spectrum, without the need to reveal the identity of the voter.

Page 8: Shaar e voting using cdma

• C of size w

E of sizez

P of size n

S of size n

Page 9: Shaar e voting using cdma

The set of people who participate in this decision making process are in fact a subset E of size z, belonging to a mother set P of size n. The set P is comprised of all persons eligible (and registered) for voting.

Page 10: Shaar e voting using cdma

The size of P is larger than or equal to the size of E, because some persons who have the right to participate in the process of voting, may not do that.

Page 11: Shaar e voting using cdma

In such processes, we can guarantee that:

The identity of the person who voted for a certain choice is not going to be revealed.

There is a record, at the election center (election committee), indicates whether certain person has voted or not. This could be very important from the audit trail point of view.

Page 12: Shaar e voting using cdma

In this case, the system should:I-Prevent any eligible voter from voting

more than once, using the same code assigned to him. Solution will be discussed later.

Page 13: Shaar e voting using cdma

II- Prevent any eligible voter from examining the code assigned to him, generating a new proper code, to be used by a person who is not eligible for voting, or even by the eligible person himself again. Solution is achieved by encrypting the code assigned to each voter, using the public key of the election committee (person pt).

Page 14: Shaar e voting using cdma

The Proposed System 2-

Page 15: Shaar e voting using cdma

The proposed e-voting system is described as follows:

Suppose that there is a set P of size n of geographically separated persons,

P = {p0, p1, p2,……, pi,……, pn-1}.Those people are wishing to electronically

elect one of them. This can be expanded to electing a certain committee or list. Another possible expansion is to take a decision based on a certain threshold number of persons agreeing with a certain proposal.

Page 16: Shaar e voting using cdma

This set of persons asks a Highly Trusted Organization (company or third party) HTO, to arrange for this election. HTO will assign each person pi belonging to P a binary sequence (code) si which belongs to a set of sequences S of size n such that:

S = {s0, s1, s2,……, si,……, sn-1}

Page 17: Shaar e voting using cdma

The set S has an interesting property: the spectrum of the periodic crosscorrelation function for a pair of sequences u and v belonging to S is the same as that for any other pair of sequences belonging to S. There are many CDMA sequence sets classes which possess this property, such as:

Gold sequence sets.Kasami large sets.Kasami small sets.Bent sequence sets.

Page 18: Shaar e voting using cdma

To illustrate the crosscorrelation spectrum, let us consider the case of Gold sequence sets. A Gold sequence set is comprised of D+2 sequences, each of length (period) D, such that:

D= 2q - 1, Where q is a positive integer not a

multiple of 4.

Page 19: Shaar e voting using cdma

The periodic crosscorrelation function for any pair belonging to the set, takes only one of the following three values:

{-1, -t(q), t(q)-2} for all relative shifts between this pair of

sequences, where

t(q) = 1 + 2(q+2)/2 ;where: x denotes the integer part of the real number x.

Page 20: Shaar e voting using cdma

Set ESet PSet SSet Cc0

e0 p0s0c1

e1 p1s1c2

| | ||

| |||

ez-1pn-1sn-1||cw-1

accomplished by HTO

w << n

accomplished by HTO

one– to– onecorrespondence

voted

n< =z

Page 21: Shaar e voting using cdma

pt(EC)

e0

ez-1

ez-2

ei

e1

e2

Page 22: Shaar e voting using cdma

Vote message mi of eiCode si assigned to ei (originally as pi)

Encryption of msi using the public key of pt

Decryption of MSi using the private key of pt

Vote message miCode si assigned to ei

Combined message msi

MSi = encrypted msi using the public key of ptUnsecure channel

Page 23: Shaar e voting using cdma

checking the crosscorrelation properties between si and st (the code of pt)

Vote rejection

Comparing si with the already voted codes

((people

mismatch

repeated

Not repeated

Page 24: Shaar e voting using cdma

Accepting the vote message mi of ei

Taking decision according to the specified threshold

Yes or No(decision)

mo m1mi

mz-1

Fig. 3 Steps used to accomplish voting in the proposedsystem

Page 25: Shaar e voting using cdma

3- Feasibility Aspects of The Proposed System

Page 26: Shaar e voting using cdma

Implementing the proposed system is quite feasible. This is because all of the processes required for realizing such a system are quite feasible. Those processes are:

Comparative study of different sequence sets of unified crosscorrelation spectrum, especially those of very big size and of very long sequences..

Writing a software package for generating those sequence sets and examining their crosscorrelation spectra.

Page 27: Shaar e voting using cdma

Writing a software package for examining the best subsets of sequences from the randomness point of view, taking into consideration the required size of those subsets.

Designing a model for the system and conducting simulation processes to check its strengths against different types of attacks, including impersonation.

Comparing the strengths of the proposed system with the existing e-voting systems from different points of view.

Page 28: Shaar e voting using cdma

It could be better to present an example, applying Gold sequence sets. Suppose that the system will be used for electing the Mayor of a county of 100,000 eligible voters. Let F denote the number of all possible preferred pairs of m-sequences of degree 33 (required to generate the Gold set), and let q = 33, then the sequence length:

D = 233 – 1 = 8 589 934 592 – 1, and the set size w = 8 589 934 592 + 1.

Page 29: Shaar e voting using cdma

Suppose that the following parameters are standard (known to intruders):

The sequence length,The algorithm (Gold sequence sets

based construction, but not the specific pair of preferred pair of m-sequences),

then the key space of the system will be:

Page 30: Shaar e voting using cdma

F*(8 589 934 592 + 1)/100 000, which is approximately equals to:

F*858 993At the moment, the value of F for q = 33,

is not specified yet, but it is conjectured to be a very large value. This is because:

Page 31: Shaar e voting using cdma

For q = 7, the sequence length:D = 27 – 1 =127

The value of F equals 90This indicates that the value of F will be very

very large for q=33 or q=31It is conjectured that the value of F will be

enormous for the case of q=31Because D will be Mersenne Prime

D = 231 – 1 =2147483647

Page 32: Shaar e voting using cdma

Suppose that F was around 120000; then the key space will be:

120 000*858 993=103 079 160 000

This means that there are around one hundred trillion candidates for each assigned code (sequence). Remembering that each code is very very long, then the brute force attack on this system is very very hard, (nearly impossible).

Page 33: Shaar e voting using cdma

Conclusions-4

Page 34: Shaar e voting using cdma

I believe that the idea of the proposed system is original and it will be easy to realize such a system. Consequently CDMA can be used in e-voting as an alternative to the existing systems. However, the proposed system needs more investigation, especially from the audit trail point of view. It is expected that publishing this paper will trigger such investigations.

Page 35: Shaar e voting using cdma

Thank you for your time.

I hope that I was able to convey the basic ideas of my proposed

system.