SlideShare uma empresa Scribd logo
1 de 83
Baixar para ler offline
(Electronic)
Voting Security
           Ben Adida
       Harvard University

  Workshop on Electronic Voting
         IDC Herzliya
         17 May 2009
The Point of An Election
The Point of An Election

 “The People have spoken....
       the bastards!”
                            Dick Tuck
               1966 Concession Speech
The Point of An Election

 “The People have spoken....
       the bastards!”
                                Dick Tuck
                   1966 Concession Speech



      Provide enough evidence
       to convince the loser.
quot;That's for me and a
 button to know.quot;
     Joe, the plumber.
5
5
5
5
5
5
5
6
6
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




              http://www.cs.uiowa.edu/~jones/voting/pictures/7
Fashionable Voting




                     8
Fashionable Voting




                     8
Voting is a
fundamentally
difficult problem.


                    9
Wooten got the news from his wife, Roxanne,
  who went to City Hall on Wednesday
        to see the election results.

  quot;She saw my name with zero votes by it.
      She came home and asked me if
       I had voted for myself or not.quot;



                                              10
14

12
14

                   12




1 person, 1 vote
Enforced Privacy
to ensure each voter
   votes in his/her
  own interest

                       12
http://www.cs.uiowa.edu/~jones/voting/pictures/   13
1892 - Australian Ballot




     http://www.cs.uiowa.edu/~jones/voting/pictures/   14
The Ballot Handoff

  McCain




Alice the Voter
                                17
The Ballot Handoff

  McCain




Alice the Voter
                                17
The Ballot Handoff

  McCain




Alice the Voter
                                17
The Ballot Handoff

  McCain




Alice the Voter
                                17
The Ballot Handoff

  McCain                        Obama
                                Obama
                                 Obama


                                McCain
                                McCain
                                 McCain



Alice the Voter
                                          17
The Ballot Handoff

  McCain                           Obama
                                   Obama
                                    Obama


                                   McCain
                                   McCain
                                    McCain



Alice the Voter        Black Box
                                             17
Chain of Custody




                   18
Chain of Custody
            /*          1
             * source
             * code
             */

            if (...

                            Vendor




                                     18
Chain of Custody
                    /*          1
                     * source
                     * code
       Voting   2    */
      Machine
                    if (...

                                    Vendor




                                             18
Chain of Custody
                             /*          1
                              * source
                              * code
 Polling        Voting        */
           3             2
Location       Machine
                             if (...

                                             Vendor




                                                      18
Chain of Custody
                                 /*          1
                                  * source
                                  * code
     Polling        Voting        */
               3             2
    Location       Machine
                                 if (...

                                                 Vendor
        4

Alice




                                                          18
Chain of Custody
                                 /*          1
                                  * source
                                  * code
     Polling        Voting        */
               3             2
    Location       Machine
                                 if (...

                                                 Vendor
        4

Alice




                                                          18
Chain of Custody
                                                   /*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice

               5


                       Ballot Box Collection

                                                                            18
Chain of Custody
                                                   /*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice
                                                                   Results
               5                                         6           .....


                       Ballot Box Collection

                                                                             18
Chain of Custody
                                                   /*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice
                                                                   Results
               5                                         6           .....


                       Ballot Box Collection
                            Black Box
                                                                             18
The Cost of Secrecy
The Cost of Secrecy
The Cost of Secrecy
The Cost of Secrecy
The Cost of Secrecy
But Secrecy is Important.

   Secret Ballot implemented in Chile in 1958.

       “the secrecy of the ballot [...] has
     first-order implications for resource
allocation, political outcomes, and social efficiency.”

              [BalandRobinson 2004]
Because we care about
a meaningful result,
 we’ve made auditing
    very difficult.

                        21
We are left chasing
evidence of correctness.

Meanwhile we destroy
evidence on purpose.
                           22
Obtaining Evidence
                                                   /*          1
                                                    * source
                                                    * code
     Polling                  Voting                */
                   3                           2
    Location                 Machine
                                                   if (...

                                                                   Vendor
        4

Alice
                                                                   Results
               5                                         6           .....


                       Ballot Box Collection

                                                                             23
Obtaining Evidence
                                 /*          1
                                  * source
                                  * code
 Polling            Voting        */
             3               2
Location           Machine
                                 if (...

                                                 Vendor
   - source code audit
   - Logic & Accuracy
   - Parallel Testing
   - Voter-Verified Paper Audit Trail
Obtaining Evidence
     Polling
    Location
               3   - Multiple poll watchers
                     competing affiliations

                   - No personal
        4

Alice
                     electronic devices
                     at the polling station

                   - Logging all events
Obtaining Evidence
- redundant counts
- ballot box seals
- statistical auditing by partial recounts

                                    Results
    5                           6     .....


        Ballot Box Collection
Fragmented, Adversarial
     and Indirect
- each piece of evidence covers
  a small segment of the chain.
- attacker knows the checks, and can try to
  sneak in where the chain is not covered.
- to maintain security and for practical
  purposes, the evidence is very indirect.
The Effect of DREs

- More to audit
- Errors can have disproportionate effects
- Software is not just for speed/efficiency,
  it becomes central for integrity.
Software
  Independence

an undetected mistake in the
  system does not cause an
undetectable error in the tally.
Can we get
 more direct,
more end-to-end
   evidence?
Secret Ballot vs.
           Verifiability

Voting System
                convince
                           Alice

                                   Carl the Coercer



                                                 31
Secret Ballot vs.
               Verifiability

Voting System
                        convince
                                             Alice

                                                                Carl the Coercer
  [Chaum81], [Benaloh85], [PIK93], [BenalohTuinstra92], [SK94], [Neff2001], [FS2001],
                [Chaum2004], [Neff2004], [Ryan2004], [Chaum2005]

    Punchscan, Scantegrity I & II, Civitas, ThreeBallot, Prêt-à-Voter, Scratch & Vote, ...
                                                                                             31
Public Ballots
   Bulletin Board


               Bob:
              McCain

         Carol:
         Obama




                       32
Public Ballots
           Bulletin Board


                       Bob:
                      McCain

                 Carol:
                 Obama




Alice
                               32
Public Ballots
            Bulletin Board

         Alice:         Bob:
         Obama         McCain

                  Carol:
                  Obama




Alice
                                32
Public Ballots
            Bulletin Board

         Alice:         Bob:
         Obama         McCain

                  Carol:
                  Obama
                                   Tally

                                Obama....2
                                McCain....1
Alice
                                              32
Encrypted Public Ballots
            Bulletin Board

        Alice:          Bob:
         Rice          Clinton

                  Carol:
                   Rice
                                    Tally

                                 Obama....2
                                 McCain....1
Alice
                                               33
Encrypted Public Ballots
                         Bulletin Board

                    Alice:           Bob:
                     Rice           Clinton

                               Carol:
Ali                             Rice
   ce
        ver                                      Tally
            ifies
                   he
                     rv                       Obama....2
                       ote
                                              McCain....1
Alice
                                                            33
Encrypted Public Ballots
                         Bulletin Board

                    Alice:              Bob:
                     Rice              Clinton

                               Carol:
Ali
   ce                           Rice                           ta lly
        ver                                                 e
                                                          thTally
            ifies                                    rifies
                                                 ve
                   he
                     rv                 eryone
                       ote         E   v                  Obama....2
                                                          McCain....1
Alice
                                                                        33
End-to-End Verification
End-to-End Verification
                       /*
                        * source
                        * code
              Voting    */
             Machine
                       if (...

                                   Vendor

   Polling
  Location
End-to-End Verification
                                  /*
                                   * source
                                   * code
                Voting             */
               Machine
                                  if (...

                                              Vendor

                          Ballot Box /
     Polling             Bulletin Board
    Location




Alice
End-to-End Verification
                                  /*
                                   * source
                                   * code
                Voting             */
               Machine
                                  if (...

                                              Vendor

                          Ballot Box /             Results
     Polling             Bulletin Board
    Location                                           .....




Alice
End-to-End Verification
                                      /*
                                       * source
                                       * code
                    Voting             */
                   Machine
                                      if (...

                                                  Vendor

                              Ballot Box /             Results
     Polling                 Bulletin Board
    Location                                               .....




                  1
Alice
               Receipt
End-to-End Verification
                                      /*
                                       * source
                                       * code
                    Voting             */
                   Machine
                                      if (...

                                                      Vendor

                              Ballot Box /                 Results
     Polling                 Bulletin Board
    Location                                                   .....




                  1                               2
Alice
               Receipt
Open-Audit
 Elections
Evidence-Based
   Elections
Questions?
ben_adida@harvard.edu

Mais conteúdo relacionado

Destaque

STORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМ
STORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМSTORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМ
STORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМ
Pharm.education
 
Willy Masvanhise -NEBOSH IGC Certificates (1)
Willy Masvanhise -NEBOSH IGC Certificates (1)Willy Masvanhise -NEBOSH IGC Certificates (1)
Willy Masvanhise -NEBOSH IGC Certificates (1)
Willy Masvanhise
 
Iaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligentIaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligent
Iaetsd Iaetsd
 
Multimedia project
Multimedia projectMultimedia project
Multimedia project
cedricr
 
bobby_mays_resume_1
bobby_mays_resume_1bobby_mays_resume_1
bobby_mays_resume_1
Bobby Mays
 

Destaque (17)

Helios: web-based truly verifiable voting
Helios: web-based truly verifiable votingHelios: web-based truly verifiable voting
Helios: web-based truly verifiable voting
 
Truly Verifiable Elections
Truly Verifiable ElectionsTruly Verifiable Elections
Truly Verifiable Elections
 
Sociale medier - personlige og professionelt - 2013
Sociale medier - personlige og professionelt - 2013Sociale medier - personlige og professionelt - 2013
Sociale medier - personlige og professionelt - 2013
 
Denver IT Support Company presents What is Cloud Computing? Answering Questio...
Denver IT Support Company presents What is Cloud Computing? Answering Questio...Denver IT Support Company presents What is Cloud Computing? Answering Questio...
Denver IT Support Company presents What is Cloud Computing? Answering Questio...
 
3Com 3C13770A
3Com 3C13770A3Com 3C13770A
3Com 3C13770A
 
Memento
MementoMemento
Memento
 
La sexualidad
La sexualidadLa sexualidad
La sexualidad
 
Virksomhetssøk for prosjekt - Comperio
Virksomhetssøk for prosjekt  - ComperioVirksomhetssøk for prosjekt  - Comperio
Virksomhetssøk for prosjekt - Comperio
 
STORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМ
STORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМSTORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМ
STORYTELLING: КАК РАЗРАБОТАТЬ КУРС В ВОВЛЕКАЮЩИМ СЦЕНАРИЕМ
 
Strengthening the environment for web entrepreneurs in europe 22 november 2011
Strengthening the environment for web entrepreneurs in europe 22 november 2011Strengthening the environment for web entrepreneurs in europe 22 november 2011
Strengthening the environment for web entrepreneurs in europe 22 november 2011
 
Horòscop,
Horòscop,Horòscop,
Horòscop,
 
Willy Masvanhise -NEBOSH IGC Certificates (1)
Willy Masvanhise -NEBOSH IGC Certificates (1)Willy Masvanhise -NEBOSH IGC Certificates (1)
Willy Masvanhise -NEBOSH IGC Certificates (1)
 
Iaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligentIaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligent
 
G4
G4G4
G4
 
100 قاعدة له‌ ريَزماني عه‌ره‌بي - زۆر گرنگه‌ بۆ قوتابياني به‌شي عه‌ره‌بي - و...
100 قاعدة له‌ ريَزماني عه‌ره‌بي  - زۆر گرنگه‌ بۆ قوتابياني به‌شي عه‌ره‌بي - و...100 قاعدة له‌ ريَزماني عه‌ره‌بي  - زۆر گرنگه‌ بۆ قوتابياني به‌شي عه‌ره‌بي - و...
100 قاعدة له‌ ريَزماني عه‌ره‌بي - زۆر گرنگه‌ بۆ قوتابياني به‌شي عه‌ره‌بي - و...
 
Multimedia project
Multimedia projectMultimedia project
Multimedia project
 
bobby_mays_resume_1
bobby_mays_resume_1bobby_mays_resume_1
bobby_mays_resume_1
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Voting Security Overview