Voting System Requirements



Similar documents
General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

A Survey of Current Secret-Ballot Systems David Chaum

THE M100 OPTICAL SCAN PRECINCT TABULATOR Idaho Procedures OVERVIEW

E-Democracy and e-voting

PUBLIC REPORT. Red Team Testing of the ES&S Unity Voting System. Freeman Craft McGregor Group (FCMG) Red Team

SENATE BILL State of Washington 64th Legislature nd Special Session

Volume I, Section 4 Table of Contents

Principles and guidelines for remote ballot marking systems

NATIONAL TALLY CENTER (NTC) OPERATIONS PROCEDURES Presidential and Provincial Council Elections

Volume I, Appendix C Table of Contents

AutoMARK Pre-election/ L&A/Post-test Procedures

An Electronic Voting System Based On Blind Signature Protocol

Ballot Now Audit Tool 1.0 Operations Manual

Speaker s Commission on Digital Democracy Consultation on Electronic Voting

California Association of Clerks and Elections Officials Canvass Subcommittee

Jones letter 1 1/15/07

Pre-Election Audit of Memory Cards for the August 2008 Connecticut Primary Elections

Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University

Voting with confidence

Position Statement on Electronic Voting

End-to-End Verifiability for Optical Scan Voting Systems. Emily Shen

Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)

What items constitute an event as it relates to the requirements of a voting system's audit logging?

Colorado Secretary of State Election Rules [8 CCR ]

Le vote électronique : un défi pour la vérification formelle

Information Security Basic Concepts

ES&S Unity Election Systems & Software

VoteID 2011 Internet Voting System with Cast as Intended Verification

Analysis of an Electronic Boardroom Voting System

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING

Introduction. Conducting a Security Review

Usability Study of the Open Audit Voting System Helios

E-voting System: Specification and Design Document

Case no: Version: 2.0 The e-vote 2011-project Date: 25. Sep e-vote 2011 Security Objectives

Voting Systems Security, Testing & More

South Dakota State Board of Elections ES&S Voting System (EVS) State Certification

Electronic Voting Protocol Analysis with the Inductive Method

Cryptography: Authentication, Blind Signatures, and Digital Cash

Secure Electronic Voting

A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)

Quality Assurance Program

Verification and Validation Issues in Electronic Voting

E-Voting System and Its Importance

SCORE An Overview. State of Colorado Registration and Election Management

Software Independence

Tradeoffs for Internet Voting Options

Guidance for candidates and agents

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Knowledge Based Authentication (KBA) Metrics

Hang Seng HSBCnet Security. May 2016

Summary of Results from California Testing of the ES&S Unity /AutoMARK Voting System

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

Electronic voting in the Netherlands

Ballot Casting Assurance

Juan E. Gilbert, Ph.D. TSYS Distinguished Associate Professor Fellow, AU Center for Governmental Services. Auburn University

DEMOCRACY SUITE PERSONNEL DEPLOYMENT AND TRAINING REQUIREMENTS

WidePoint Solutions Corp. SAFE HARBOR PRIVACY POLICY

Veriable Classroom Voting: Where Cryptography Meets Pedagogy

From Voice to Electronic....the Evolution of the Voting Process in Louisiana...

Internet voting feasibility study

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

BUSINESS CHICKS, INC. Privacy Policy

;~ The Dutch water boards The demand for e-voting Our Main goals and criteria History of RIES Challenges for RIES Demonstration of e-voting Q+A

A Secure RFID Ticket System For Public Transport

Vinodu George 1 and M P Sebastian 2. vinodu.george@gmail.com. sebasmp@nitc.ac.in

Design Principles for Protection Mechanisms. Security Principles. Economy of Mechanism. Least Privilege. Complete Mediation. Economy of Mechanism (2)

1CHAPTER. Information about Judges of Election and Polling Place Administrators JUDGES OF ELECTION. Appointment/Assignment.

United States Election Assistance Commission. Certificate of Conformance ES&S EVS

Voting Systems Checklist

Operating System Security

1. The Electoral Commission (the Commission) welcomes the UK Government s second consultation on prisoners voting rights.

E-Voting System Security Optimization

5CHAPTER. Setting Up the Polling Place. IMPORTANT: The electronic poll book MUST be set up first and you MUST begin the update by 5:15 am.

Ion Sancho Supervisor of Elections

RESPONSE TO REQUEST FOR PROPOSAL VOTING SYSTEMS/EQUIPMENT SOLICITATION # DG5502 ISSUED JULY 9, 2004

Statement of Daniel D. Castro Senior Analyst. Information Technology and Innovation Foundation

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF STATE Harrisburg, PA BASIC GUIDE TO STUDENT VOTING IN PENNSYLVANIA

Electronic Voting Systems

Computer Security. Draft Exam with Answers

Election Dates Calendar

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

13 Ways To Increase Conversions

Election Activity Watchers Colorado law & regulations

12543 Westella, Suite 100, Houston, Texas 77077, Recount Procedures

GUIDE TO THE SANTA CLARA COUNTY REGISTRAR OF VOTERS

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Apache Milagro (incubating) An Introduction ApacheCon North America

Ranked Choice Voting and Voter Turnout in San Francisco s 2005 Election

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots

Security Basics: A Whitepaper

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Comments on the Report e-voting Security Study Written by the Communications-Electronics Security Group

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Verifying a Secret-Ballot Election with Cryptography

THE IMPORTANCE OF USABILITY TESTING OF VOTING SYSTEMS

2016 Election Calendar

Chapter 6. Formatting Text with Character Tags

The Advantages of Automatic Protocol Creation

voter registration in a digital age: delaware

Signing Documents with Requests for Attachments

Transcription:

Voting System Requirements WOTE 01 Tomales Bay, California, Aug 27-30, 2001. Presentation by: Ed Gerck, Ph.D. egerck@safevote safevote.com CEO & VP of Technology Safevote Inc., 2001. 1

What We Don t Want in Voting Systems EODFNER[ YRWHU 7UXV PH WDOOLH YRWHV Safevote Inc., 2001. 2

$FFXUDF Y 5HOLDELOLW\ Detection KLJ DFFXUDF\ KLJ UHOLDELOLW\ OR DFFXUDF\ KLJ UHOLDELOLW\ time KLJ DFFXUDF\ OR UHOLDELOLW\ OR DFFXUDF\ OR UHOLDELOLW\ 5HOLDELOLW E PD\ FORV W $FFXUDF FD E L GLJLWD EX QR HTXD W V\VWHPV Safevote Inc., 2001. 3

Outcome Uncertainty The outcome uncertainty of a voting system can be seen as accuracy and reliability problems in counting votes. Lack of accuracy or reliability introduces two different types of errors: accuracy affects the spread of one event, for example whether a vote that was selected to be cast by a voter can be counted or not from a ballot; reliability affects a number of events in time and/or space, for example, count differences when repeatedly reading votes from the same stack of ballots. Safevote Inc., 2001. 4

Voting System Components 1. Voter Registration Voter must be legally identified 2. Voter Authentication Authenticate voter + ballot style + ballot rotation 3. Voting Station Privacy + security 4. Ballot Box Ballot integrity 5. Tallying and Auditing Anonymity + Secrecy + Verification + Public proofs Safevote Inc., 2001. 5

DVN! Election Process Is A Web of Interactions Candidate Registration Rec ount A udit B allot Creation B allot Distribution Tally V oter Registration V oting Credential M anagement Credential Creation Credential Distribution 7LP V\QFKURQL]DWLRQ LQYROYH HTXHQF DQ RYHUOD,QWHUGHSHQGHQFLHV HOHFWLR SKDVH DU QR LQGHSHQGHQW 6XSHUYLVLRQ PRV DU" QR SHUIRUPH# L$ LVRODWLRQ &URVVYHULILFDWLRQ% QDWXUDOO& KHOS' W( VWR) HUURU'+* IUDXG 5HGXQGDQF\% QDWXUDOO& KHOS' W( SURYLG, IDXOWWROHUDQFH +2:(9(5- $. HOHFWLR. L/ D. RSHQORR010 URFHVV Safevote Inc., 2001. 6

An Election Is An Open-loop Process Open-loop - I know all voters and I know all votes - But if I see the vote, I must not see the voter - But if I see the voter, I must not see the vote Not like accounting Not like bank transactions Not like e-commerce +22 &$3,17(*5,74 %5 *8$5$17(('" Safevote Inc., 2001. 7

Federal Election Commission (FEC) Voting System Standards WHAT ARE THEY? Minimum Functional Requirements, and Performance Characteristics, and Documentation Requirements, and Test Evaluation Criteria Safevote Inc., 2001. 8

FEC Voting System Standards WHAT ARE THEY NOT? Not High-Level System Requirements Not Clear Definitions Not Technologically Neutral Not Consistent 7+(56,7 8 1((9 )2: 8 &203/(76 7(&+1,&$; 9,6,21 Safevote Inc., 2001. 9

16 Strict Voting System Requirements GOALS: Consistency, Clear Definitions, Technologically Neutral, Strict 1. Fail-safe voter privacy 2. Collusion-free vote secrecy 3. Verifiable election integrity 4. Fail-safe privacy in verifiability 5. Physical recounting and auditing 6. 100% accuracy 7. Represent blank votes 8. Prevent overvotes 9. Provide for null ballots 10. Allow undervotes 11. Authenticated ballot styles 12. Manifold of links avoid single points of failure even if improbable 13. Off-line secure control structure 14. Technology independent 15. Authenticated user-defined presentation 16. Open review, open code Safevote Inc., 2001. 10

16 Strict Voting System Requirements WHAT ARE THEY NOT? Not The Only Answer Not A Solution Not Proprietary Not Closed Not Analytic Not dominated by today s limitations Safevote Inc., 2001. 11

1. Fail-safe voter privacy Voter privacy is the inability to link a voter to a vote. - Lack of voter privacy means: vote buying, voter coercion, and lack of election integrity! - Must NOT depend on policy or computation (crypto). - Must NOT depend on election officials. - Voter privacy is NOT anonymity. - US: Law is powerless to break voter privacy. (However, in the UK legal procedures can break voter privacy) Safevote Inc., 2001. 12

2. Collusion-free vote secrecy Vote secrecy is the inability to know what the vote is. - Lack of vote secrecy means: vote buying, voter coercion, and lack of election integrity! - Must NOT depend on policy or computation (crypto). - Must NOT depend on any election official. - Must NOT depend on threshold of collusion (i.e., vote secrecy must not depend on a group of election officials not colluding, however large the group may be). Safevote Inc., 2001. 13

3. Verifiable Election Integrity Election integrity is the inability of any number of parties to influence the outcome except by properly voting. - Election integrity must be verifiable, not just trusted. - Must provide for election verifiability of all votes cast (open-loop problem) - Must provide verifiability of one voter, one vote. Safevote Inc., 2001. 14

4. Fail-safe Privacy in Verification If all ballots are verified, voter privacy is guaranteed. - Receipt-freeness applies to the entire system. - Voter privacy trumps verifiability, auditing. - Election privacy only exists for precincts. - Precincts may have from a few to ~600 voters. Safevote Inc., 2001. 15

5. Physical Recounting and Auditing Recounting and Auditing must not be like playing the same CD twice. - Must provide for reliability in auditing and vote recounting, with an error rate as low as desired or, less strictly, with an error rate comparable to or better than conventional voting systems. - The auditing and vote proofs must be capable of being physically stored, recalled and compared off-line and in real-time during the election, without compromising election integrity or voter privacy, and allowing effective human verification as defined by election rules. Safevote Inc., 2001. 16

6. 100% Accuracy Every vote or absence of vote (no vote) MUST be correctly counted, with zero error. - 100% accuracy is possible in digital systems with voter feedback. - Depends on voter. There is no way for usefully reading the voter s intent except by that which is readable from the ballot. - 100% accuracy is not possible when digitization error is involved, such as in reading punch cards or optical scan ballots. Safevote Inc., 2001. 17

7. Represent Blank Votes A blank vote is a valid no vote. - A no vote is part of the election language. - A blank vote is NOT a residual vote, NOT a lost vote. - Voters could have a none of the above choice. - Must allow voters to change choices from vote to blank vote and vice-versa, at will, for any race and number of times, before casting the ballot. Safevote Inc., 2001. 18

8. Prevent Overvotes The system must be decidable. - As defined by election rules. - Must provide automatic radio button action for single-vote races. - If overvoting is detected in multiple-vote races, must warn the voter that a vote has to be cleared if changing choices is desired. - The warning must be made known only to the voter, without public disclosure. - Allowing overvoted races can be enable fraud by latter marking, which can disqualify an otherwise correctly voted race or ballot. Safevote Inc., 2001. 19

9. Provide for Null Ballots A null ballot is a valid voter choice. - A null ballot is part of the election language. - Lack of a null ballot option may lead to protest votes. - Voters could have null race and null ballot choices. - As defined by election rules, one may allow voters to null races or even the entire ballot as an option (e.g., to counter coercion; to protest against lack of voting options). - Overvoting, otherwise prevented by Requirement #8, may be used as a mechanism to provide for null ballots. However, this can enable fraud as noted. Safevote Inc., 2001. 20

10. Allow Undervotes An undervote is a valid no vote but it may be a mistake, not an intent. - As defined by election rules, the voter may receive a warning of undervoting. - However, such a warning must not be public and must not prevent undervoting. - An undervote is NOT a lost vote, NOT a residual vote. Safevote Inc., 2001. 21

11. Authenticated Ballot Styles Ballot styles and ballot rotation need to be authenticated. - The ballot style (allowed races based on a voter s address) and ballot rotation (expected candidate shuffling in a race) to be used by each voter must be authenticated, otherwise the voter may be using a wrong ballot or seeing the candidates in a biased order. - Election integrity may be compromised if ballot styles and ballot rotation are incorrect, even if all other parts of the election system are not compromised. - Must be provided without any other control structure but that given by the voter authentication process itself, to avoid control splits that could be exploited at system interfaces. Safevote Inc., 2001. 22

12. Manifold of Links Avoid single points of failure. - Must use redundant links and keys to securely define, authenticate and control ballots. - Must avoid single points of failure even if improbable. - A paper ballot is a single point of failure for that vote. - If networks are used, must forestall Denial-of-Service (DoS) and other attacks with an error rate comparable or better than conventional voting systems. Safevote Inc., 2001. 23

13. Off-line Secure Control Structure Ballots must have an off-line secure end-to-end control structure. - Voting systems must not be required to be always online in order to work or to be secure. - Voting systems may use digital certificates under a single authority. - Must avoid control splits that could be exploited at system interfaces. - Ballot control must control the least set of objects, to reduce complexity and thus improve fault- and attack-tolerance. - Ballot control must be data-independent, representation-independent and language-independent. Safevote Inc., 2001. 24

14. Technology Independent Technology may change, elections should not. - Voting system requirements should not define how. - Must allow ballots and their control to be used off-line and/or in dial-up and/or in networks such as the Internet, with standard PCs or hand-held devices used to implement their components in hardware or in software, alone or in combination for each part. Safevote Inc., 2001. 25

15. Authenticated User-defined Presentation Voters must be able to customize usability. - Usability must not introduce risks of compromise or induce changes to security-critical parts of the system. - Must enable the ballots to dynamically support multiple languages, font sizes and layouts. - Voters should be able to choose the language and display format that they are be most comfortable with when voting, as allowed by law. - As required by voters with disabilities. - To prevent design problems, voters must be presented with an authenticated list of choices defined by election rules. Safevote Inc., 2001. 26

16. Open Review, Open Code Allow all source code to be publicly known and verified. - The availability and security of the system must not rely on: keeping its code or rules secret (which cannot be guaranteed), or limiting access to only a few people (who may collude or commit a confidence breach voluntarily or involuntarily), or preventing an attacker from observing any number of ballots and protocol messages (which cannot be guaranteed). - The system should have zero-knowledge properties (i.e.,observation of system messages do not reveal any information about the system). - Object code must be verifiable against compiled source code. - Operating systems must be verifiable. - Only keys must be considered secret. Safevote Inc., 2001. 27

16 Strict Voting System Requirements Since voting system requirements are a complex logical system, it is a mathematical fact that they cannot be both consistent and complete. The 16 Voting System requirements were chosen so that they are consistent. 1. Fail-safe voter privacy 2. Collusion-free vote secrecy 3. Verifiable election integrity 4. Fail-safe privacy in verifiability 5. Physical recounting and auditing 6. 100% accuracy 7. Represent blank votes 8. Prevent overvotes 9. Provide for null ballots 10. Allow undervotes 11. Authenticated ballot styles 12. Manifold of links avoid single points of failure even if improbable 13. Off-line secure control structure 14. Technology independent 15. Authenticated user-defined presentation 16. Open review, open code Safevote Inc., 2001. 28

Summary of References Voting System Requirements: http://www.safevote.com/ifc01.pdf http://www.thebell.net/papers/vote-req.pdf Specifications, demos, test results: http://www.safevote.com http://www.mysafevote.com Safevote Inc., 2001. 29

Voting System Requirements WOTE 01 Tomales Bay, California, Aug 27-30, 2001. Presentation by: Ed Gerck, Ph.D. egerck@safevote safevote.com CEO & VP of Technology Safevote Inc., 2001. 30