Analysis of an Electronic Boardroom Voting System

Size: px
Start display at page:

Download "Analysis of an Electronic Boardroom Voting System"

Transcription

1 Analysis of an Electronic Boardroom Voting System Mathilde Arnaud Véronique Cortier Cyrille Wiedling VoteID 13 July 18th 2013

2 The Family of Electronic Voting

3 The Family of Electronic Voting Voting Machines Authentication at the polling place. Speed up the process (voting, tally). Better accessibility for people. Proprietary systems often subject to attacks: > Diebold Machines, [Halderman et al., EVT 07] > Indian Voting Machines, [Gonggrijp et al., CCS 10]

4 The Family of Electronic Voting Authentication from anywhere. Systems often difficult to understand for non-cryptographers. Internet Voting Numerous solutions (proprietary and academic): > Helios [Adida, SS 08] > Civitas [Clarkson et al., S&P 08] > FOO, Belenios, etc. Assume to trust the voter s computer.

5 Different Interesting Properties Verifiability Anonymity and more... Usability Easy-to- Understand

6 And Boardroom Voting? Everyone in the same room (authentication by others). Efficiency of the voting process is necessary. Confidence in the result. There are solutions, but... > Often in black box, > With no verifiability,... A new proposal from a subgroup of members of a CNRS commitee to achieve: Boardroom Voting > Simplicity, > Privacy, > Full Verifiability.

7 Setting A boardroom (including all the voters)

8 Setting A boardroom (including all the voters) E-Voting Devices

9 Setting A boardroom (including all the voters) E-Voting Devices Link to Central Device

10 Setting A boardroom (including all the voters) E-Voting Devices Link to Central Device Links to Screen (Visible by all)

11 Setting A boardroom (including all the voters) E-Voting Devices Link to Central Device Links to An assessor (One voter, can be anyone) Screen (Visible by all)

12 A First Approach How it works?

13 A First Approach How it works?

14 A First Approach How it works?

15 A First Approach How it works?

16 A First Approach How it works?

17 A First Approach How it works? Blue Wins!

18 A First Approach How it works? Blue Wins!?

19 A First Approach Aye! How it works? Aye! Blue Wins! Aye!?

20 But... A possible attack Similar to Clash Attacks [Küsters et al., S&P 12].

21 But... A possible attack Similar to Clash Attacks [Küsters et al., S&P 12].

22 But... A possible attack Similar to Clash Attacks [Küsters et al., S&P 12].

23 But... A possible attack Similar to Clash Attacks [Küsters et al., S&P 12].

24 But... A possible attack Similar to Clash Attacks [Küsters et al., S&P 12].

25 But... A possible attack Similar to Clash Attacks [Küsters et al., S&P 12].

26 But... A possible attack Orange Wins!? Similar to Clash Attacks [Küsters et al., S&P 12].

27 But... Aye! A possible attack Aye! Orange Wins! Aye!? Similar to Clash Attacks [Küsters et al., S&P 12].

28 Two New Versions 1 F2FV : Randomness genererated by the central device

29 Two New Versions 2 F2FV : One more randomness generated by the voter. The system still has privacy issues when central device is corrupted.

30 Two New Versions 3 F2FV : Randomness only generated by the voter. We need that voters generate actual random numbers.

31 Contributions We have three (slightly) different protocols for boardroom voting. > None of them ensures privacy when BB is corrupted. > All of them are easy to understand. In this paper, we provide: > Proofs of privacy of F2FV2 and F2FV3 assuming that infrastructure players are honest. > Proofs of correctness in the case of a dishonest ballot box (central device).

32 Did you say «proofs»? Proof in a symbolic model. We model the protocols using applied pi-calculus. In the presence of an attacker who : can read every message sent on the network, can intercept messages, can create and send new messages. can vote himself.

33 Abstraction Messages are represented by terms. Nonces, keys : h, i n, m,..., k 1,k 2,... Primitives : n {} hn, {m} k i {m} k, hm 1,m 2 i m k Modeling deduction rules : x y hx, yi hx, yi x hx, yi y x y {x} y y {x} y x

34 Applied Pi-Calculus, ::= formulae M = N M 6= N ^ _ P, Q, R ::= (plain) processes 0 null process P Q parallel composition!p replication n.p name restriction if then P else Q conditional u(x).p message input uhm i.p message output event(m).p event Introduced by Abadi and Fournet A, B, C ::= extended processes P plain process A B parallel composition n.a name restriction x.a variable restriction { M / x } active substitution

35 Modeling the Protocol A simple equationnal theory: fst(pair(x 1,x 2 )) = x 1 snd(pair(x 1,x 2 )) = x 2

36 Modeling the Protocol A simple equationnal theory: fst(pair(x 1,x 2 )) = x 1 snd(pair(x 1,x 2 )) = x 2 A sample, the voter: V n (c, c e,c a,c p,v)= k.c(x). chhx, k, vii. c e (y). if hx, k, vi2 n y then c a hoki else c a hfaili

37 Modeling the Protocol A simple equationnal theory: fst(pair(x 1,x 2 )) = x 1 snd(pair(x 1,x 2 )) = x 2 A sample, the voter: V n (c, c e,c a,c p,v)= k.c(x). chhx, k, vii. c e (y). if hx, k, vi2 n y then c a hoki else c a hfaili B n (c 1 v,...,c n v,c b )= r 1,...,r n. c 1 vhr 1 i..... c n v hr n i. c 1 v(y 1 )..... c n v (y n ). (c b hy 1 i c b hy n i) E n (c b,c e,c p )= c b (t 1 )..... c b (t n ). let r = ht 1,...,t n i in c p hri. (! c e hri) A n (c e,c 1 a,...,c n a,c p )= c e (z 0 ). c 1 a(z 1 )..... c n a(z n ). if n(z 0,z 1,...,z n ) then c p hoki else c p hfaili

38 Property 1: Privacy Privacy: (Delaune, Kremer, Ryan, 2009) P( ) P( )

39 Property 1: Privacy Privacy: (Delaune, Kremer, Ryan, 2009) P( ) P( ) A bit more formally... A process specification P satisfies ballot secrecy iff: P [V A { v 1 / v } V B { v 2 / v }] l P [V A { v 2 / v } V B { v 1 / v }] with l the observational equivalence.

40 Privacy Results Theorem 1 Assuming that the infrastructure players (Ballot Box, Screen, Assessor) are honest and, at least, two voters are honest: F2FV2 and F2FV3 preserve ballot privacy.

41 Privacy Results Theorem 1 Assuming that the infrastructure players (Ballot Box, Screen, Assessor) are honest and, at least, two voters are honest: F2FV2 and F2FV3 preserve ballot privacy. Theorem 2 Even if the Assessor is also dishonest: F2FV2 and F2FV3 still preserve ballot privacy.

42 Property 2: Correctness Correctness: (Catalano et al., 2010) P( )!

43 Property 2: Correctness Correctness: (Catalano et al., 2010) P( )!

44 Property 2: Correctness Correctness: (Catalano et al., 2010) P( )! A bit more formally... 8v 1,...,v m and every execution of the protocol leading to validation of result : P [V 1 (v 1 ) V m (v m )]! ñ. (event(t r ).Q Q 0 ) then and a permutation such that: 9 v m+1,...,v n t r = v (1),...,v (n) t r

45 Correctness Results Theorem 3 Even if the Ballot Box is corrupted, assuming that the Screen and the Assessor are honest: F2FV2 and F2FV3 ensure vote correctness.

46 Results: Summary Results Privacy Correctness \ Corr. Players System \ None Ballot Box Assessor None Ballot Box Assessor F2FV1 F2FV2 F2FV3

47 Conclusion Two versions of a boardroom voting system ensuring privacy and vote correctness in a very convenient way. To ensure vote correctness, we need that: > Voters really use (unpredictable) random numbers. > Voters must cast a vote (even blank) and check it.

48 Conclusion Two versions of a boardroom voting system ensuring privacy and vote correctness in a very convenient way. To ensure vote correctness, we need that: > Voters really use (unpredictable) random numbers. > Voters must cast a vote (even blank) and check it. Future Work Although the system is clearly not coercion-resistant, we may have a form of receipt-freeness.

49 Thank you for your attention! So... What s next...? Hey! I m a voting device! Not a TV remote control!

Le vote électronique : un défi pour la vérification formelle

Le vote électronique : un défi pour la vérification formelle Le vote électronique : un défi pour la vérification formelle Steve Kremer Loria, Inria Nancy 1 / 17 Electronic voting Elections are a security-sensitive process which is the cornerstone of modern democracy

More information

How to prove security of communication protocols?

How to prove security of communication protocols? 1/37 Introduction on security protocols Modeling Verification Towards cryptographic guarantees How to prove security of communication protocols? Véronique Cortier, LORIA - CNRS, Nancy Colloquium Morgenstern,

More information

Electronic Voting Protocol Analysis with the Inductive Method

Electronic Voting Protocol Analysis with the Inductive Method Electronic Voting Protocol Analysis with the Inductive Method Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)

Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract) Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract) Orhan Cetinkaya Institute of Applied Mathematics, METU, Ankara, Turkey e113754@metu.edu.tr Abstract Electronic voting

More information

E-Democracy and e-voting

E-Democracy and e-voting E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting

More information

Secure APIs and Simulationbased. Exposé thésard

Secure APIs and Simulationbased. Exposé thésard Secure APIs and Simulationbased Security Exposé thésard 1 ME & MY THESIS at LSV since Oct 2010 Batiment IRIS Supervisors: Graham & Steve INRIA 2 Outline What are Secure Tokens, and what use do they have?

More information

Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting

Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Denis Butin 1 / 37 2 / 37 Introduction Network communication sensitive: banking, private correspondence,

More information

Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University

Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University United States House of Representatives, Committee on House Administration Subcommittee on Elections

More information

Mobile implementation and formal verification of an e-voting system

Mobile implementation and formal verification of an e-voting system Mobile implementation and formal verification of an e-voting system Stefano Campanelli, Alessandro Falleni, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli IIT CNR, Via G. Moruzzi 1, 56124 Pisa,

More information

Formalising privacy-type security properties using the applied pi calculus

Formalising privacy-type security properties using the applied pi calculus Formalising privacy-type security properties using the applied pi calculus Rémy Chrétien and Stéphanie Delaune LSV, ENS Cachan & CNRS & INRIA Saclay Île-de-France The results presented in this report are

More information

Am I Decisive? Handout for Government 317, Cornell University, Fall 2003. Walter Mebane

Am I Decisive? Handout for Government 317, Cornell University, Fall 2003. Walter Mebane Am I Decisive? Handout for Government 317, Cornell University, Fall 2003 Walter Mebane I compute the probability that one s vote is decisive in a maority-rule election between two candidates. Here, a decisive

More information

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. Introduction. Since 2001 T-Systems made research on secure online voting systems

More information

Volume I, Appendix C Table of Contents

Volume I, Appendix C Table of Contents Appendix C for Voting Officials (Informative) Volume I, Appendix C Table of Contents C Appendix for Voting Officials.... 1 C.1 for Human Factors.... 1 C.2 for Security... 4 i May 9, 2005 Appendix C for

More information

A Survey of Current Secret-Ballot Systems David Chaum

A Survey of Current Secret-Ballot Systems David Chaum A Survey of Current Secret-Ballot Systems David Chaum WOTE ANALYSIS Outline Models, Taxonomy of Tools, Key Technologies, Paradigms, Composition, etc SYSTEMS Mainstream US deployed (with comparison) New/proposed

More information

A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)

A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract) A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract) Zhe Xia University of Surrey z.xia@surrey.ac.uk Steve Schneider University of Surrey s.schneider@surrey.ac.uk May 25, 2006 Abstract

More information

Lecture 9 - Message Authentication Codes

Lecture 9 - Message Authentication Codes Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,

More information

An Electronic Voting System Based On Blind Signature Protocol

An Electronic Voting System Based On Blind Signature Protocol CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,

More information

Secure Electronic Voting

Secure Electronic Voting 7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University

More information

Analysis of a Biometric Authentication Protocol for Signature Creation Application

Analysis of a Biometric Authentication Protocol for Signature Creation Application Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

More information

An Implementation of Secure Online Voting System

An Implementation of Secure Online Voting System An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., anisaaranadaph@gmail.com

More information

Verification and Validation Issues in Electronic Voting

Verification and Validation Issues in Electronic Voting Verification and Validation Issues in Electronic Voting Orhan Cetinkaya 1, and Deniz Cetinkaya 2 1 Institute of Applied Mathematics, METU, Ankara, Turkey 2 Computer Engineering, METU, Ankara, Turkey e113754@metu.edu.tr

More information

Formal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mcrl2

Formal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mcrl2 Formal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mcrl2 Hamid Reza Mahrooghi, Mohammad Hashem Haghighat, Rasool Jalili Network Security Center Department of Computer

More information

Win8 Networking FinishLynx with Meet Management Technical Support Guide

Win8 Networking FinishLynx with Meet Management Technical Support Guide FINISHLYNX NETWORKING WIN 8 LYNX SYSTEM DEVELOPERS, INC. Win8 Networking FinishLynx with Meet Management Technical Support Guide Sections 1 and 2 should be completed on both FinishLynx and Meet Management

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

Online Voting for Better Government State IT Management Initiative

Online Voting for Better Government State IT Management Initiative Nomination: Marshall University s On-line Voting for Better Government Online Voting for Better Government State IT Management Initiative Nomination Form May 23, 2003 extension to deadline granted. Title

More information

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally Abstract A purely peer to peer version of electronic vote would allow online votes to be sent directly from one party to another without going through a central voting register. Digital signatures provide

More information

Speaker s Commission on Digital Democracy Consultation on Electronic Voting

Speaker s Commission on Digital Democracy Consultation on Electronic Voting UKCRC/2014/4 Speaker s Commission on Digital Democracy Consultation on Electronic Voting UKCRC Response The UK Computing Research Committee (UKCRC), an Expert Panel of the British Computer Society (BCS),

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Verifying a Secret-Ballot Election with Cryptography

Verifying a Secret-Ballot Election with Cryptography Verifying a Secret-Ballot Election with Cryptography Ben Adida PhD Thesis Defense Thesis Committee Ronald L. Rivest, Srini Devadas, Shafi Goldwasser 22 June 2006 Ostraka (sea shells) http://darkwing.uoregon.edu/~klio/im/gr/ath/athen%20-%20ostraka.jpg

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Independent Computations for Safe Remote Electronic Voting

Independent Computations for Safe Remote Electronic Voting Alec Yasinsac University of South Alabama 1. Introduction In a world where a high percentage of citizens carry a smart phone or ipod and most households have one or more computers, it is difficult to understand

More information

NIST E-Authentication Guidance SP 800-63 and Biometrics

NIST E-Authentication Guidance SP 800-63 and Biometrics NIST E-Authentication Guidance SP 800-63 and Biometrics September 21, 2004 Bill Burr william.burr@nist.gov OMB M-0404 Guidance on E-Auth Part of E-Government initiative put services online About identity

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Lecture 19: Chapter 8, Section 1 Sampling Distributions: Proportions

Lecture 19: Chapter 8, Section 1 Sampling Distributions: Proportions Lecture 19: Chapter 8, Section 1 Sampling Distributions: Proportions Typical Inference Problem Definition of Sampling Distribution 3 Approaches to Understanding Sampling Dist. Applying 68-95-99.7 Rule

More information

Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones

Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg

More information

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

Efficient construction of vote-tags to allow open objection to the tally in electronic elections Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent

More information

On Coercion-Resistant Electronic Elections

On Coercion-Resistant Electronic Elections On Coercion-Resistant Electronic Elections with Linear Work Stefan G. Weber, Roberto Araújo, Johannes Buchmann Darmstadt University of Technology Department of Computer Science Hochschulstrasse 10, 64289

More information

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer

More information

Internet Voting Protocols with Everlasting Privacy

Internet Voting Protocols with Everlasting Privacy Internet Voting Protocols with Everlasting Privacy Jeroen van de Graaf Joint work with Denise Demirel e Roberto Samarone jvdg@dccufmgbr Lleida, July 2013 Jeroen van de Graaf Joint work with Denise Demirel

More information

Remote (Internet) Voting in Digital India

Remote (Internet) Voting in Digital India Remote (Internet) Voting in Digital India Ideas for today and tomorrow National Conference on Remote Voting (NCRV) 2015 20-21 st July 2015 @IITM, Meghdoot, Pune The fundamental challenge in public voting

More information

4. Binomial Expansions

4. Binomial Expansions 4. Binomial Expansions 4.. Pascal's Triangle The expansion of (a + x) 2 is (a + x) 2 = a 2 + 2ax + x 2 Hence, (a + x) 3 = (a + x)(a + x) 2 = (a + x)(a 2 + 2ax + x 2 ) = a 3 + ( + 2)a 2 x + (2 + )ax 2 +

More information

An electronic scheme for the Farnel paper-based voting protocol

An electronic scheme for the Farnel paper-based voting protocol An electronic scheme for the Farnel paper-based voting protocol R. Araújo 1, R. Custódio 2, A. Wiesmaier 1, and. akagi 3 1 echnische Universität Darmstadt, Germany 2 George Washington University, USA 3

More information

What is network security?

What is network security? Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application

More information

The Design of Web Based Secure Internet Voting System for Corporate Election

The Design of Web Based Secure Internet Voting System for Corporate Election The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2

More information

E-voting System: Specification and Design Document

E-voting System: Specification and Design Document 1 E-voting System: Specification and Design Document March 6, 2003 Jamie Brown Domari Dickinson Carl Steinebach Jeff Zhang 2 Introduction During the 2000 General Elections, America realized that our election

More information

Individual Electoral Registration FREQUENTLY ASKED QUESTIONS

Individual Electoral Registration FREQUENTLY ASKED QUESTIONS Individual Electoral Registration FREQUENTLY ASKED QUESTIONS 1 CONTENTS Why has the system changed? What is individual electoral registration? How do I register to vote? How do I find my National Insurance

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper

More information

Analysis of an internet voting protocol

Analysis of an internet voting protocol Analysis of an internet voting protocol Kristian Gjøsteen March 9, 2010 Abstract The Norwegian government will trial internet voting in the 2011 local government elections. We describe and analyse a simplified

More information

AP Statistics Chapters 11-12 Practice Problems MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

AP Statistics Chapters 11-12 Practice Problems MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. AP Statistics Chapters 11-12 Practice Problems Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Criticize the following simulation: A student

More information

Ballot Casting Assurance

Ballot Casting Assurance Ballot Casting Assurance Ben Adida MIT C. Andrew Neff VoteHere Abstract We propose that voting protocols be judged in part on ballot casting assurance, a property which complements universal verifiability.

More information

Verifiable Voting Systems

Verifiable Voting Systems Chapter 69 Verifiable Voting Systems Thea Peacock 1, Peter Y. A. Ryan 1, Steve Schneider 2 and Zhe Xia 2 1 University of Luxembourg 2 University of Surrey 1 Introduction The introduction of technology

More information

Formal Modelling of Network Security Properties (Extended Abstract)

Formal Modelling of Network Security Properties (Extended Abstract) Vol.29 (SecTech 2013), pp.25-29 http://dx.doi.org/10.14257/astl.2013.29.05 Formal Modelling of Network Security Properties (Extended Abstract) Gyesik Lee Hankyong National University, Dept. of Computer

More information

An Overview of Common Adversary Models

An Overview of Common Adversary Models An Overview of Common Adversary Karl Palmskog palmskog@kth.se 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional

More information

2011 municipal and county council elections

2011 municipal and county council elections Important voter information 2011 municipal and county council elections Election day is 12 September. Remember to bring ID! English engelsk 2011 municipal and county council elections The municipal council

More information

Real World Experiences with Bingo Voting and a Comparison of Usability

Real World Experiences with Bingo Voting and a Comparison of Usability Real World Experiences with Bingo Voting and a Comparison of Usability Michael Bär 1, Christian Henrich 1, Jörn Müller-Quade 1, Stefan Röhrich 2 and Carmen Stüber 1 1 Institut für Algorithmen und Kognitive

More information

The Advantages of Automatic Protocol Creation

The Advantages of Automatic Protocol Creation AUTOMATIC PROTOCOL CREATION FOR INFORMATION SECURITY SYSTEM Mr. Arjun Kumar arjunsingh@abes.ac.in ABES Engineering College, Ghaziabad Master of Computer Application ABSTRACT Now a days, security is very

More information

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

More information

Combinatorial Proofs

Combinatorial Proofs Combinatorial Proofs Two Counting Principles Some proofs concerning finite sets involve counting the number of elements of the sets, so we will look at the basics of counting. Addition Principle: If A

More information

Helios: Web-based Open-Audit Voting

Helios: Web-based Open-Audit Voting Helios: Web-based Open-Audit Voting Ben Adida ben adida@harvard.edu Harvard University Abstract Voting with cryptographic auditing, sometimes called open-audit voting, has remained, for the most part,

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631 Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.

More information

How to register and use our Chat System

How to register and use our Chat System How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you

More information

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING Verified Voting Founded in 2004 by computer scientists Non-partisan, not for profit. Focus on elections technology security, auditability,

More information

Presiding Officer Training

Presiding Officer Training Presiding Officer Training City Council & Police & Crime Commissioner 5 May 2016 Electoral Services Team Liz Read, Electoral Services Manager Laura Martin, Electoral Services Operations Team Leader Matthew

More information

e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh}

e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh} e-voting software CS 312 Project Software Requirements Specification (SRS) Document {Anurag, Ashish, Harshavardhan, Ramkrishan, Sumesh} 1 Introduction 1.1 Purpose The purpose of this document is to make

More information

Individual Electoral Registration Frequently asked questions

Individual Electoral Registration Frequently asked questions Individual Electoral Registration Frequently asked questions 1 Contents Contents... 2 About the change to individual electoral registration... 6 Has the registration system changed?... 6 Who is responsible

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

Vinodu George 1 and M P Sebastian 2. vinodu.george@gmail.com. sebasmp@nitc.ac.in

Vinodu George 1 and M P Sebastian 2. vinodu.george@gmail.com. sebasmp@nitc.ac.in Vinodu George 1 and M P Sebastian 2 1 LBS College of Engineering, Kasaragod, Kerala, India vinodu.george@gmail.com 2 National Institute of Technology, Calicut, Kerala, India sebasmp@nitc.ac.in ABSTRACT

More information

Notes from February 11

Notes from February 11 Notes from February 11 Math 130 Course web site: www.courses.fas.harvard.edu/5811 Two lemmas Before proving the theorem which was stated at the end of class on February 8, we begin with two lemmas. The

More information

On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples

On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples Brian Hilley Boston College MT695 Honors Seminar March 3, 2006 1 Introduction 1.1 Mazur s Theorem Let C be a

More information

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition

More information

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Security/Privacy Models for Internet of things: What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global

More information

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

RSA and Primality Testing

RSA and Primality Testing and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2

More information

Business Plan: Municipal Elections

Business Plan: Municipal Elections Business Plan: Municipal Elections How does this service contribute to the results identified in the City of London Strategic Plan? A Vibrant and Diverse Community By conducting the municipal election

More information

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI-04-116 Institute for Software Research International and H. John Heinz III School of Public

More information

Math 251, Review Questions for Test 3 Rough Answers

Math 251, Review Questions for Test 3 Rough Answers Math 251, Review Questions for Test 3 Rough Answers 1. (Review of some terminology from Section 7.1) In a state with 459,341 voters, a poll of 2300 voters finds that 45 percent support the Republican candidate,

More information

An Anonymous Endorsement System

An Anonymous Endorsement System JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 107-114 (2002) Short Paper An Anonymous Endorsement System Department of Electrical Engineering National Taiwan University Taipei, 106 Taiwan E-mail:

More information

Usability Study of the Open Audit Voting System Helios

Usability Study of the Open Audit Voting System Helios Usability Study of the Open Audit Voting System Helios Janna-Lynn Weber University of Waterloo Waterloo, Ontario, Canada j6weber@uwaterloo.ca Urs Hengartner University of Waterloo Waterloo, Ontario, Canada

More information

Video Conferencing in K157A

Video Conferencing in K157A Video Conferencing in K157A Introductory points/guidelines for use: 1. It is a dedicated point to point videoconference system. It is not compatible with pc/web based programs such as Skype. 2. It is an

More information

Random Auditing of E-Voting Systems: How Much is Enough?

Random Auditing of E-Voting Systems: How Much is Enough? E-Voter Education Project Random Auditing of E-Voting Systems: How Much is Enough? by Howard Stanislevic Research Consultant VoteTrustUSA E-Voter Education Project August 9, 2006 (Revised August 16, 2006)

More information

Cryptography and Network Security Digital Signature

Cryptography and Network Security Digital Signature Cryptography and Network Security Digital Signature Xiang-Yang Li Message Authentication Digital Signature Authentication Authentication requirements Authentication functions Mechanisms MAC: message authentication

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

Colorado Secretary of State Election Rules [8 CCR 1505-1]

Colorado Secretary of State Election Rules [8 CCR 1505-1] Rule 7. Elections Conducted by the County Clerk and Recorder 7.1 Mail ballot plans 7.1.1 The county clerk must submit a mail ballot plan to the Secretary of State by email no later than 90 days before

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

Comparison of e-voting schemes: Estonian and Norwegian solutions

Comparison of e-voting schemes: Estonian and Norwegian solutions Comparison of e-voting schemes: Estonian and Norwegian solutions M J Morshed Chowdhury morshed@ut.ee NordSecMob, University of Tartu Abstract. In October 2005, Estonia organized countrywide remote e- voting.

More information

Teachers guide kids voting 2016. for the Local Government Elections

Teachers guide kids voting 2016. for the Local Government Elections Teachers guide kids voting 2016 for the Local Government Elections Contents Welcome to Kids Voting 2016 3 Key dates 4 Evaluating the programme 5 Starting out with your Kids Voting election 6 Setting up

More information

Voting with confidence

Voting with confidence Voting with confidence Report of the Election Process Advisory Commission Summary, Conclusions and Recommendations 27 September 2007 Summary The Commission considers that the election process in the Netherlands

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru

More information

Certified Security Proofs of Cryptographic Protocols in the Computational Model : an Application to Intrusion Resilience

Certified Security Proofs of Cryptographic Protocols in the Computational Model : an Application to Intrusion Resilience Certified Security Proofs of Cryptographic Protocols in the Computational Model : an Application to Intrusion Resilience Pierre Corbineau Mathilde Duclos Yassine Lakhnech Université de Grenoble, CNRS Verimag,

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Guidance for candidates and agents

Guidance for candidates and agents European Parliamentary elections in Great Britain Guidance for candidates and agents Part 5 of 6 Your right to attend key electoral events This document applies only to the 22 May 2014 European Parliamentary

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 2, No 2, 2011 Designing and developing secure protocol for mobile voting Abhishek Kumar 1,Ashok Kumar Srivastava 2 1- Junior Scientist, Computer Division, CSIR-Central Drug Research Institute, Chattar Manzil Palace,

More information

End-to-End Verifiability for Optical Scan Voting Systems. Emily Shen

End-to-End Verifiability for Optical Scan Voting Systems. Emily Shen End-to-End Verifiability for Optical Scan Voting Systems by Emily Shen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree

More information

WHERE DOES THE 10% CONDITION COME FROM?

WHERE DOES THE 10% CONDITION COME FROM? 1 WHERE DOES THE 10% CONDITION COME FROM? The text has mentioned The 10% Condition (at least) twice so far: p. 407 Bernoulli trials must be independent. If that assumption is violated, it is still okay

More information