Today: Security of voting systems, Monday, April 27th
Interesting application of cryptography. Challenging primarily because of the
need for a secret ballot (how individual people voted).
Voting is not just about producing an answer, but also evidence that the
answer is correct: convince losers that they lost fair and square.
Voting tech survey
- public voting
- no secrecy of ballot
 
- Problem: You can sell your vote, or be coerced
 
 
- paper ballots
- initially could have different ballots for each vote
 
- then "Australian" ballot came in, 1893
 
- same ballot, and people had to read the candidate names
and write down their vote
- controversial at the time because not all people could read and write
 
 
 
- lever machines
- easy to manipulate and increase counts
 
- See "Behind the freedom curtain" (1957)
 
 
- punch cards
- invented in 1960s based on computerized punch card
 
- now illegal due to HAVA (Help America Vote Act) of 2002
 
- the famous "butterfly ballot"
- human interface design for voting systems is critical
 
 
 
- optical scan
 
- Direct Recording by Electronics (DRE)
- first used in 1970s
 
- essentially a standalone computer
 
- no state other than counts, produces no evidence
 
 
- DRE + Voter-verified Paper Audit Trail (VVPAT)
- "really terrible technology"
 
 
- Vote by mail
- Often used for absentee voting, but some states use it as default
 
- Typically uses opscan ballots
 
- suffers from retail fraud
- voters can be coerced by boss/wife/etc
 
 
- chain of custody
- maybe vote gets lost
 
- can confirm vote got there using a code, but not that your vote stayed
the same
 
 
 
- internet voting
- doesn't seem like we have the technology for this
 
- risks combining the worst features of vote-by-mail (coercion) with the
problems of DRE's (software security) and then adding new vulnerabilities
(DDOS, foreign power attacks)
 
- Why?
- Because we can?
 
- More people will show up?
- Political scientists say this is actually insignificant: when voting
methods are changed, turnout stays about the same
 
 
 
- Helios, Ben Adida
 
- Civitas, Clarkson, Chong, Myers
 
 
- etc.
 
Questions to ask of every voting system:
- Does it produce the right answer?
 
- Does the voter vote in private?
 
- Does it produce evidence that the outcome is correct?
 
Retail fraud vs. wholesale fraud
- retail fraud: by vote one by one
 
- wholesale fraud: get hold of computers and change the counts (1000s of vote
at the same time)
 
Voting requirements
- Voter registration: each eligible voter votes at most once
 
- Voter privacy: no one can tell how any voter voted, even if voter
wants it (to discourage selling of votes). no "receipt" for voter
 
- Integrity: votes can't be changed, added or deleted; tally is accurate
 
- Availability: voting systems is available for use when needed
 
- Ease of use
 
- Accessibility: for voters with disabilities
 
- Assurance: verifiable integrity
 
Security threats
Adversaries:
- Political zealots
 
- Voters may wish to sell votes
 
- Election officials may be partisan
 
- Vendors may have evil insider
 
- Foreign powers because result can affect them
 
- ...really anybody
 
Threats:
- dead people voting
 
- ballot-box stuffing by election officials with votes from people who did not
show up
 
- coercion/intimidation/buying votes
 
- replacing votes or memory cards
 
- miscount
 
- malicious software
 
- viruses
 
Strategies:
- can voter have a receipt? that won't work if her receipt has her vote in
plaintext because voter can sell vote now
 
Software independence (SI): a voting system is software dependent if an undetected
error in the software can cause an undetectable change in the reported election
outcome
New voting system proposals: "end to end"
- uses web so voter can check that here ballot was counted as she intended
 
Properties:
- votes verifiably cast as intended
 
- votes verifiably collected as cast 
 
- votes verifiably counted as collected
 
VVPAT only gets the first: once ballot is cast, "chain of custody" determines 
what happens
Twin (Rivest and Smith)
- "academic" proposal
 
- each paper ballot has a copy made that is put in mixer bin
 
- voter casts original paper ballot (which is scanned and published
on web) and takes home from mixer bin a copy of some previous voter's ballot
as a receipt
 
- then voter can check that the receipt he got is on the web
 
- can detect fraud, but you'd better have a plan for what to do
 
Twin has all the "end-to-end" properties.
Scantegrity II (Chaum et al)
- marries traditional opscan with modern crypto end-to-end methods
 
- uses 
- invisible ink for "confirmation codes"
- special pens reveal confirmation codes when you mark your candidate
 
- voters copy and take home CCs
 
- officials post revealed CCs
 
- voters can confirm posting (uses ballot serial number for lookup) and
protest if incorrect
 
 
- web site
 
- crypto in the back end
 
 
- ballots can be scanned by ordinary scanners
 
- ballots can be recounted by hand as usual