98
Cryptography and Voting Ben Adida Harvard University EVT & WOTE August 11th, 2009 Montreal, Canada

Cryptography and Voting

Embed Size (px)

DESCRIPTION

EVT/WOTE 2009 Invited Talk on Cryptography and Voting for non-cryptographers.

Citation preview

Page 1: Cryptography and Voting

Cryptographyand Voting

Ben AdidaHarvard University

EVT & WOTEAugust 11th, 2009Montreal, Canada

Page 2: Cryptography and Voting

“If you think cryptographyis the solution

to your problem....

2

Page 3: Cryptography and Voting

... then youdon’t understandcryptography...

3

Page 4: Cryptography and Voting

... then youdon’t understandcryptography...

3

... and you don’t understand your

problem.”-Peter, Butler, Bruce

Page 5: Cryptography and Voting

Yet, cryptography solves problems that initially

appear to be impossible.

4

Page 6: Cryptography and Voting

There is apotential paradigm shift.

A means ofelection verificationfar more powerful

than other methods.5

Page 7: Cryptography and Voting

Three Points

6

1. Voting is a unique trust problem.

2. Cryptography is not just about secrets,it creates trust between competitors,it democratizes the auditing process.

3. Open-Audit Voting is closing in on practicality.

Page 8: Cryptography and Voting

1.Voting is a unique

trust problem.

7

Page 9: Cryptography and Voting

“Swing Vote”

terrible movie.hilarious ending.

8

Page 10: Cryptography and Voting

Wooten got the news from his wife, Roxanne, who went to City Hall on Wednesday

to see the election results.

"She saw my name with zero votes by it.She came home and asked me ifI had voted for myself or not."

9

Page 11: Cryptography and Voting

10

Page 12: Cryptography and Voting

11

Page 13: Cryptography and Voting

12

Bad Analogies

Dan Wallach’s great rump session talk.

More than thatATMs and planes are vulnerable(they are, but that’s not the point)

It’s that voting is much harder.

Page 14: Cryptography and Voting

13

Bad AnalogiesAdversaries➡ pilots vs. passengers (airline is on your side, I think.)➡ banking privacy is only voluntary:

you are not the enemy.

Failure Detection & Recover➡ plane crashes & statements vs. 2% election fraud➡ Full banking receipts vs. destroying election evidence

Imagine➡ a bank where you never get a receipt.➡ an airline where the pilot is working against you.

Page 15: Cryptography and Voting

Ballot secrecyconflicts with auditing,

cryptographycan reconcile them.

14

Page 17: Cryptography and Voting

16

Page 18: Cryptography and Voting

Vendor

/*

* source

* code

*/

if (...

1

16

Page 19: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

16

Page 20: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

16

Page 21: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

4

Alice

16

Page 22: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

4

Alice

16

Page 23: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

Ballot Box Collection

5

4

Alice

16

Page 24: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

Ballot Box Collection

5

Results

.....6

4

Alice

16

Page 25: Cryptography and Voting

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

Ballot Box Collection

5

Results

.....6

4

Alice

Black Box

16

Page 26: Cryptography and Voting

Chain of Custody

Page 27: Cryptography and Voting

Chain of Custody

Page 28: Cryptography and Voting

Chain of Custody

Page 29: Cryptography and Voting

Chain of Custody

Page 30: Cryptography and Voting

Chain of Custody

Page 31: Cryptography and Voting

18

Initially,cryptographers

re-createdphysical processesin the digital arena.

Page 32: Cryptography and Voting

19

Then, a realization: cryptography enables a new voting paradigm

Secrecy + Auditability.

Page 33: Cryptography and Voting

20

Page 34: Cryptography and Voting

Bulletin Board

Public Ballots

Bob:McCain

Carol:Obama

21

Page 35: Cryptography and Voting

Bulletin Board

Public Ballots

Bob:McCain

Carol:Obama

Alice

21

Page 36: Cryptography and Voting

Bulletin Board

Public Ballots

Alice:Obama

Bob:McCain

Carol:Obama

Alice

21

Page 37: Cryptography and Voting

Bulletin Board

Public Ballots

Alice:Obama

Bob:McCain

Carol:Obama

Tally

Obama....2McCain....

1Alice

21

Page 38: Cryptography and Voting

Encrypted Public BallotsBulletin Board

Alice:Rice

Bob:Clinton

Carol:Rice

Tally

Obama....2McCain....

1Alice

22

Page 39: Cryptography and Voting

Encrypted Public BallotsBulletin Board

Alice:Rice

Bob:Clinton

Carol:Rice

Tally

Obama....2McCain....

1Alice

Alice verifies her vote

22

Page 40: Cryptography and Voting

Encrypted Public BallotsBulletin Board

Alice:Rice

Bob:Clinton

Carol:Rice

Tally

Obama....2McCain....

1Alice

Alice verifies her vote Everyone verifies the tally

22

Page 41: Cryptography and Voting

End-to-End Verification

Page 42: Cryptography and Voting

End-to-End Verification

Polling Location

VotingMachine

Vendor

/*

* source

* code

*/

if (...

Page 43: Cryptography and Voting

End-to-End Verification

Polling Location

VotingMachine

Vendor

/*

* source

* code

*/

if (...

Ballot Box /

Bulletin Board

Alice

Page 44: Cryptography and Voting

End-to-End Verification

Polling Location

VotingMachine

Vendor

/*

* source

* code

*/

if (...

Ballot Box /

Bulletin Board

Alice

Results

.....

Page 45: Cryptography and Voting

End-to-End Verification

Polling Location

VotingMachine

Vendor

/*

* source

* code

*/

if (...

Receipt

1

Ballot Box /

Bulletin Board

Alice

Results

.....

Page 46: Cryptography and Voting

End-to-End Verification

Polling Location

VotingMachine

Vendor

/*

* source

* code

*/

if (...

Receipt

1 2

Ballot Box /

Bulletin Board

Alice

Results

.....

Page 47: Cryptography and Voting

Democratizing Audits

24

Each voter is responsible for checkingtheir receipt (no one else can.)

Anyone, a voter or a public org,can audit the tally andverify the list of cast ballots.

Thus, OPEN-AUDIT Voting.

Page 48: Cryptography and Voting

2.Cryptography is

not just about secrets,creates trust between

competitors.

25

Page 49: Cryptography and Voting

NO!

Increased transparencywhen some data

must remain secret.26

Page 50: Cryptography and Voting

So, yes, we encrypt,and then we operate on the encrypted data in public, so

everyone can see.

In particular, because the vote is encrypted, it can remain labeled with voter’s name.

27

Page 51: Cryptography and Voting

“Randomized” Encryption

28

Page 52: Cryptography and Voting

“Randomized” EncryptionKeypair consists of a public key and a secret key .skpk

28

Page 53: Cryptography and Voting

“Randomized” EncryptionKeypair consists of a public key and a secret key .skpk

"Obama" 8b5637Encpk

28

Page 54: Cryptography and Voting

“Randomized” EncryptionKeypair consists of a public key and a secret key .skpk

"Obama" 8b5637Encpk

c5de34Encpk"McCain"

28

Page 55: Cryptography and Voting

“Randomized” EncryptionKeypair consists of a public key and a secret key .skpk

"Obama" 8b5637Encpk

c5de34Encpk"McCain"

a4b395Encpk"Obama"

28

Page 56: Cryptography and Voting

Threshold Decryption

8b5637

Secret key is shared amongst multiple parties:all (or at least a quorum) need to cooperate to decrypt.

29

Page 57: Cryptography and Voting

Threshold Decryption

8b5637

b739cbDecsk1

Secret key is shared amongst multiple parties:all (or at least a quorum) need to cooperate to decrypt.

29

Page 58: Cryptography and Voting

Threshold Decryption

8b5637

b739cbDecsk1

261ad7Decsk2

Secret key is shared amongst multiple parties:all (or at least a quorum) need to cooperate to decrypt.

29

Page 59: Cryptography and Voting

Threshold Decryption

8b5637

b739cbDecsk1

261ad7Decsk2

7231bcDecsk3

Secret key is shared amongst multiple parties:all (or at least a quorum) need to cooperate to decrypt.

29

Page 60: Cryptography and Voting

Threshold Decryption

8b5637

b739cbDecsk1

261ad7Decsk2

7231bcDecsk3

8239baDecsk4

Secret key is shared amongst multiple parties:all (or at least a quorum) need to cooperate to decrypt.

29

Page 61: Cryptography and Voting

Threshold Decryption

8b5637

b739cbDecsk1

261ad7Decsk2

7231bcDecsk3

8239baDecsk4

Secret key is shared amongst multiple parties:all (or at least a quorum) need to cooperate to decrypt.

"Obama"

29

Page 62: Cryptography and Voting

Homomorphic Encryption

30

Page 63: Cryptography and Voting

Homomorphic Encryption

30

Enc(m1)! Enc(m2) = Enc(m1 + m2)

Page 64: Cryptography and Voting

Homomorphic Encryption

30

Enc(m1)! Enc(m2) = Enc(m1 + m2)

Page 65: Cryptography and Voting

Homomorphic Encryption

30

Enc(m1)! Enc(m2) = Enc(m1 + m2)

gm1 ! gm2 = gm1 +m2

Page 66: Cryptography and Voting

Homomorphic Encryption

30

then we can simplyadd “under cover” of encryption!

Enc(m1)! Enc(m2) = Enc(m1 + m2)

gm1 ! gm2 = gm1 +m2

Page 67: Cryptography and Voting

Mixnets

31

Each mix server “unwraps”a layer of this encryption onion.

c = Encpk1 (Encpk2 (Encpk3 (m)))

Page 68: Cryptography and Voting

Proving certain details while keeping others secret.

Proving a ciphertext encodes a given message

without revealingits random factor.

32

Page 69: Cryptography and Voting

Zero-Knowledge Proof

33

Page 70: Cryptography and Voting

Zero-Knowledge Proof

Vote For:

Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

33

Page 71: Cryptography and Voting

Zero-Knowledge Proof

This last envelope likely contains “Obama”

Vote For:

Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

33

Page 72: Cryptography and Voting

Zero-Knowledge Proof

Open envelopes don’t proveanything after the fact.

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For:

Paul

34

McCain

Page 73: Cryptography and Voting

Electronic Experience

35

Voter interacts with a voting machine

Obtains a freshly printed receiptthat displays the encrypted ballot

Takes the receipt home and uses itas a tracking number.

Receipts posted for public tally.

Alice

Voting Machine

Encrypted Vote

Page 74: Cryptography and Voting

Paper Experience

36

Pre-print paper ballots with some indirection betw candidate and choice

Break the indirection (tear, detach)for effective encryption

Take receipt home and use itas tracking number.

Receipts posted for public tally.q r m x

Adam - x

Bob - q

Charlie - r

David - m

q r m x

8c3sw

Adam - x

Bob - q

Charlie - r

David - m

8c3sw

q r m x

8c3sw

8c3sw

David

Adam

Bob

Charlie

_______

_______

_______

_______

David

Adam

Bob

Charlie

_______

_______

_______

_______

8c3sw

Page 75: Cryptography and Voting

3.Cryptography-based Voting

(Open-Audit Voting) is closing in on practicality.

37

Page 76: Cryptography and Voting

Benaloh Casting

38

Page 77: Cryptography and Voting

Benaloh Casting

38

Alice

Page 78: Cryptography and Voting

Benaloh Casting

38

Alice

"Obama"

Page 79: Cryptography and Voting

Benaloh Casting

38

Alice

EncryptedBallot

"Obama"

Page 80: Cryptography and Voting

Benaloh Casting

38

Alice

EncryptedBallot

Alice

"Obama"

Page 81: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

"Obama"

Page 82: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

"Obama"

Page 83: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 84: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 85: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 86: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

Alice

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 87: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

Alice

"CAST"

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 88: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

Alice

"CAST"

SignedEncryptedBallot

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 89: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

Alice

"CAST"

SignedEncryptedBallot

Alice

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 90: Cryptography and Voting

Benaloh Casting

38

"AUDIT"

Alice

EncryptedBallot

Alice

DecryptedBallot

Alice

"CAST"

SignedEncryptedBallot

Alice

SignedEncryptedBallot

DecryptedBallot

EncryptedBallot

VERIFICATION

"Obama"

Page 91: Cryptography and Voting

Many more great ideasNeff ’s MarkPledge➡ high-assurance, human-verifiable, proofs of correct encryption

Scantegrity➡ closely mirrors opscan voting

ThreeBallot by Rivest➡ teaching the concept of open-audit without deep crypto

STV: Ramchen, Teague, Benaloh & Moran.➡ handling complex election styles

Prêt-à-Voter by Ryan et al.➡ elegant, simple, paper-based

39

Page 92: Cryptography and Voting

Deployments!

UCL (25,000 voters)

Scantegrity @ Takoma Park

SCV

40

Page 93: Cryptography and Voting

Three Points

41

1. Voting is a unique trust problem.

2. Cryptography is not just about secrets,it creates trust between competitors,it democratizes the auditing process.

3. Open-Audit Voting is closing in on practicality.

Page 94: Cryptography and Voting

My Fear :

computerization of voting is inevitable.without open-audit,the situation is grim.

42

Page 95: Cryptography and Voting

My Hope:proofs for auditing

partially-secret processes will soon be as common as public-

key crypto is now.

43

Page 96: Cryptography and Voting

Challenge:

44

Ed Felten: “you have no voter privacy, deal with it.”

Page 97: Cryptography and Voting

Challenge:

44

Ed Felten: “you have no voter privacy, deal with it.”

Page 98: Cryptography and Voting

Questions?45