Upload
ali-al-shammari
View
580
Download
0
Embed Size (px)
DESCRIPTION
A general overview of e-voting systems and vote verification techniques
Citation preview
!!__________________________________________________________ !
Ali Fawzi Najm Al-Shammari PhD Student-Free University of Bolzano-Italy
Lecturer at Faculty of Computer Science - Kerbala University [email protected]
An Overview of E-Voting Systems and Vote Verification Techniques
���1
!!__________________________________________________________ ! ���2
Outlines
• Introduction
• E-Voting Systems
• Verifiability
• Vote Verification Techniques
• Conclusion
!!__________________________________________________________ !
Introduction• An election is a formal decision-making process by
which a population chooses an individual to hold elected status.
• Voting systems are the tools of any election.!
• Voting systems must fulfil with a set of requirements.
!
For instance :
���3
!!__________________________________________________________ ! ���4
Voting Requirements
Integrity (Accuracy) "Vote cast, and count as intended.
Privacy"Anonymity"
Receipt freeness"
Usability"‒ Any voter without a previous
experience can use the system.
Accessibility"‒ Any voter can vote
independently including illiterate and disabled.
!
[Jeroen V. 2009, Tigran A. 2009]
!!__________________________________________________________ !
• E-Voting, the use of technology to facilitate one or more elections processes, e.g.,:"
Record, store, and count votes electronically. "
Announcing result."
Voters’ authorization."
• Motivation ?"Speed up the precess!
More usable!
Less voter mistakes!
Supports illiterates and disabled voters
Introduction (Motivation)
���5
!!__________________________________________________________ ! ���6
• In-person e-voting"Still a voter needs to visit a polling station .!
Using a dedicated machine, in a controlled environment.!
• Online (Internet) e-voting"A voter can vote at home!
Using a personal device (PC, smart phone, ….)
Introduction (Types)
!!__________________________________________________________ ! ���7
• Direct Recording Electronics (DRE)"Dedicated computer
Touch screen
Flash memory
Head set
E-Voting Systems (In-person)
!!__________________________________________________________ ! ���8���8
• Optical Scan Systems "Scanner device
Paper ballot
Flash memory
No assistive technology!
E-Voting Systems (In-person)
!!__________________________________________________________ ! ���9
• Online Voting "Personal Device
Voting Application
Cryptography
Can we trust a personal device?
Family voting?
!
E-Voting Systems (Online Voting)
!!__________________________________________________________ !
• Electronic systems are not transparent enough for voter."
!
• Therefore, their adoption has been slow and criticized !!
E-Voting Systems (Transparency)
���10
!!__________________________________________________________ !
The Major Causes ...
• Machines are subject to programming error, equipment malfunction and malicious tampering!"
• Programs are proprietary information and are not open to inspection!"
• Procedural and Environmental implications!"
• ... also do we “trust officials” ?
���11
!!__________________________________________________________ !
Verifiability
• Support a voter, election official, and public entities with an evidence about the integrity of election results .
���12
!!__________________________________________________________ !
Types of Verification
• Individual (Voter) verifiability"
Supporting a voter with an evidence that his/her vote has been captured, cast, and count as intended."
• Universal (Public) verifiability"
Supporting the election officials, and public entities with an evidence that the count votes are the same as intended by voters.
• Eligibility (Public) verifiability"
Each count vote comes from single eligible voter.
���13
!!__________________________________________________________ !
Vote Verification
• Could supports: "
- Integrity , verifiability reaquirements.!
• Challenges:"
- Privacy, usability.!
Next, examples for vote verification techniques
���14
!!__________________________________________________________ !
• Used with DRE systems!• Vote verified over a voice message heard through a headset!• Verification voice stored in type as an evidence
VVAATT [T. Selker]
(Voter Verified Audio Audit Transcript Trail)!
���15
!!__________________________________________________________ !
VVPAT [R. Mercuri]
- A voter verifies his/her vote by reading printed paper trail. !!
- A voter can’t take the printed trail. !!
-Trails stored in safe box attached to the DRE and used for auditing later.
(Voter Verifiable Paper Audit Trail)!
Printed Peper Trail
���16
!!__________________________________________________________ ! ���17
VVAATT & VVPAT (Pros & Cons)
• Advantages"
Easy to use."
Trails are physical evidence."
• Disadvantages"
Manual auditing."
Does not allows the voter to verify the full life cycle of the his/her vote (Not an End to End Verification method)"
Votes order could be reviled."
Voter language !!
!!__________________________________________________________ !
Electronic Trails [e.g., Pnyx.VM by Scytl]
- Votes verified through an electronic verification device."!
- Electronic copy of verified votes stored in the verification device to be used for recounting.
Verification device
���18
!!__________________________________________________________ ! ���19
Pnyx.VM (Pros & Cons)
• Advantages"
Easy to use."
Automatic Auditing."
• Disadvantages"
Does not support End to End verifiability."
!!__________________________________________________________ ! ���20
How to provides an End to End verifiability without compromising privacy requirement ?
The magic of cryptography!
!!__________________________________________________________ !
VoteHere & Votegrity [D. Chaum]
- Partial information about ballot encrypted in receipt and given to voter for end-to-end verifications
printer
Encrypted receipt
���21
!!__________________________________________________________ !
Scantegrity [D. Chaum] & Pret a Voter [P. Ryan]
- Partial information about ballot encrypted in receipt and ! given to voter for end-to-end verifications
Optical scanner
Encrypted receipt
���22
!!__________________________________________________________ ! ���23���23
Cryptography (Pros & Cons)
• Advantages"
Supports an End-to-End verification."
Hard to be compromised."
• Disadvantages"
Not so usable."
What about long term privacy ?
!!__________________________________________________________ !
Problem
• Current verification methods still not able to cover all threats and challenges !!!
• Eligibility verifiability still weakly supported.
���24
!!__________________________________________________________ !
Conclusion
• Any critical system could be compromised by:"
A failure."
An attack (insider or outsider)."
• Regular system provides receipts to any user to verify the integrity of his/her data."
• In E-Voting system it is not possible to provide such receipts"
Vote must be anonymous."
A voter must not be able to approve to any one about how he/she voted. ���25
!!__________________________________________________________ ! ���26
Conclusion
• However, Academic and Industrial sectors provides some techniques that balancing between"
allowing vote verification, and"
keeping the privacy and receipt freeness requirements."
!!__________________________________________________________ ! ���27
Thanks For Your Attention"!
!
Welcome to any possible collaboration"