Verifiability experiences in government online voting

Size: px
Start display at page:

Download "Verifiability experiences in government online voting"

Transcription

1 Verifiability experiences in government online voting E-Vote-ID 2017 Jordi Puiggalí CSO and SVP of Research & Security Scytl Secure Electronic Voting October, 2017

2 Online voting security and verifiability Government adoption

3 Security and verifiability Privacy & Integrity Anonymous tally Neuchâtel Geneva Privacy & Integrity E2E encryption Standard security

4 Security and verifiability Verifiability Auditability Privacy & Integrity Universal verifiability Individual verifiability Anonymous tally E2E encryption Standard security Neuchâtel Geneva Neuchâtel Geneva

5 Verifiability

6 Verifiability Types of verifiability Vote preparation Vote casting Vote reception Vote Cast-as-intended Recorded-as-cast Electoral board Individual verifiability Based on what is verified Universal verifiability Eligibility verification Counted-as-recorded Vote counting Based on who verifies 6

7 Verifiability Implementations Cast-as-intended Return Codes: Norway and Switzerland Cast and decrypt: Estonia and Australia (NSW) Cast or cancel: used by Helios but not adopted by governments Recorded-as-cast Voting receipts: Norway and Switzerland Embedded in cast-as-intended proof: Estonia and Australia Counted-as-recorded Verifiable mixnet: Norway and Switzerland Homomorphic tally: none of the governments implemented it 7

8 Verifiability Provable security How is possible to verify if verifiability properties are properly designed? Provable security Provable security uses security (cryptographic) and/or formal (symbolic) proofs to define the security properties of the system Security proofs are based on modeling the security of the protocol in front an adversary. Formal proofs use an specific mathematical formal algebra to represent the protocol and test it using an automated formal framework. 8

9 Verifiability Source code publication Source code publication provides transparency /** * The HelloWorldApp class implements an application that * simply prints "Hello World!" to standard output. */ class HelloWorldApp { public static void main(string[] args) { System.out.println("Hello World!"); // Display the string. } } But not verifiability Publishing source code does not ensure that there are no security errors in the code that can be exploited (e.g., Washington DC project) Publishing the source code does not ensure that this code is the same one used by the voter to cast a vote Election accuracy should be independent from software audits: software independence 9

10 Verifiability Vote correctness Voting Server Ballot Box Internet Checks if vote is valid without decryption Types of votes correctness: Before casting the vote: warns voters against incorrect selections. Before storing the vote in the Ballot Box: checks contents of received votes (without compromising voter privacy) Before counting the votes: prevents counting invalid votes 10

11 Verifiability Framework The analysis of implemented voting system will evaluate the following parameters: Cast-as-intended implementation Recorded-as-cast implementation Counted-as-recorded implementation Voter verification usage Publication of source code Provable security Other properties (e.g., vote correctness) 11

12 Verifiability in government implementations Government adoption

13 Government implementations Norway Voter Encrypted vote Operates encrypted vote Operated vote Operates encrypted vote Voting card Verifies return codes Online voting server Return codes Sends return codes 13

14 Government implementations Estonia 1 Cast Voter Encrypted vote Stores encrypted vote 1 2 Verification bar code 3 4 Vote identifier 5 Online voting system server 2 Verify Encrypted vote 6 Vote decryption 14.

15 Government implementations Switzerland SwissPost/Scytl 1 Cast & verify Voter 1 Encrypted vote + verification proof Return Codes from encrypted vote 2 Voting card Verifies Return Codes 4 Return codes 3 Internet Encrypted vote Online voting system server 2 Confirm Voting card Voter 5 Validation code Internet Operates validation code 6 Verifies Finalization Code Finalization code 7 Online voting system server 15.

16 Government implementations Switzerland Geneva 1 Cast & verify Voter 1 Return Codes from clear text vote 2 Verifies Return Codes Voting card 4 return codes 3 Internet Clear-text vote Online voting system server 2 Confirm Voter 5 Validation code Operates validation code 6 Verifies Finalization Code Voting card 8 7 Finalization code Internet Online voting system server 16.

17 Government implementations Australia New South Wales 1 Cast Voter 1 Encrypted + verification vote Stores encrypted vote 2 Receipt number Online voting system 2 Verify Credential + Receipt Number 4 Stores verification vote 3 Vote contents 6 Internet Verification system 5 Decrypts verification vote 17.

18 Norway Estonia Switzerland (Swiss Post) Cast-as-intended Return codes Decryption in device Recorded-as-cast At any time Up to 1 hour with receipts Counted-as-recorded Verifiable None mixnet Voter verification 70% (small sample) 4% (large sample) Government implementations Switzerland (Geneva) Summary Australia (NSW) Return codes Return codes Decryption in server After counting None None with receipts Verifiable None Vote reencryption mixnet Unknown Unknown 1% (large sample) Public source code All the system Only server None Only counting None side + verifier side Vote correctness Yes None Yes Yes None Provable security Yes (Individual None Yes (Individual None None and Universal) and Universal) E2E encryption Yes Yes Yes No Yes 18

19 Conclusions

20 Not enough case studies to point a specific model as example of best practice, but Norway and Switzerland still the ones that have made so far more efforts Cast-as-intended implementation is more adopted than counted-asrecoded Governments still keep trust on server side and do not broad adopt universal verifiability Only two system provides full verifiability: Norway and Switzerland (SwissPost) Publication of source code is usually partial and full disclosure is linked to achieve full verifiability to avoid risks Provable security is gaining on acceptance to evaluate the correct implementation of the security properties (mainly verifiability) Conclusions Analysis 20

21 Any Questions?

22

A proposal for verifiable intra-institutional elections over Plone

A proposal for verifiable intra-institutional elections over Plone A proposal for verifiable intra-institutional elections over Plone Sergio Rajsbaum Universidad Nacional Autónoma de México (UNAM) Plone Symposium East 2011 The case of the Institute of Mathematics (UNAM)

More information

Return Code Schemes for Electronic Voting Systems

Return Code Schemes for Electronic Voting Systems Return Code Schemes for Electronic Voting Systems Shahram Khazaei Douglas Wikström Sharif University of Technology, Iran KTH Royal Institute of Technology, Sweden E-Vote-ID 2017 Presented by: Johannes

More information

Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting

Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting Ben Adida Ronald L. Rivest 30 October 2006 The Next Harvard Pres! Chain of Custody Chain of Custody /* * source * code */ 1 if (... Vendor

More information

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s Threat Assessment Summary e-voting, Admin, and pvoting TOE s, 2011 Page 1 of 22 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership

More information

Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet

Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, khazaei@kth.se Björn Terelius, terelius@kth.se Douglas Wikström, dog@csc.kth.se February 24, 2012 Abstract We study

More information

Privacy Enhancing Technologies CSE 701 Fall 2017

Privacy Enhancing Technologies CSE 701 Fall 2017 Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,

More information

The nominative data coming from the population registry and used to generate the voting cards are never stored in the evoting system database.

The nominative data coming from the population registry and used to generate the voting cards are never stored in the evoting system database. System overview Legal compliance CHVote complies to the swiss federal chancellery ordinance on Electronic Voting (VEleS) for an evoting system offered up to 30% of the resident voters. The election process

More information

Blind Signatures and Their Applications

Blind Signatures and Their Applications Department of Computer Science, National Chiao Tung University 1 / 15 Cryptanalysis Lab Outline 1 Digital Signature 2 Blind signature 3 Partially blind signature 2 / 15 Cryptanalysis Lab Digital Signature

More information

Voting System Security as per the VVSG

Voting System Security as per the VVSG Voting System Security as per the VVSG Austin Conference on State Certification Testing for Voting Systems (2017) Michael Santos Test Manager SLI Compliance Elements of Security Outside Vendor Control

More information

A Survey of Modern Electronic Voting Technologies

A Survey of Modern Electronic Voting Technologies A Survey of Modern Electronic Voting Technologies Martine Stenbro Master of Science in Communication Technology Submission date: June 2010 Supervisor: Danilo Gligoroski, ITEM Norwegian University of Science

More information

Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude

Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5051 5063 Published online 2 November 2016 in Wiley Online Library (wileyonlinelibrary.com)..1678 RESEARCH ARTICLE Norwegian internet

More information

Analysis of an E-voting Protocol using the Inductive Method

Analysis of an E-voting Protocol using the Inductive Method Analysis of an E-voting Protocol using the Inductive Method Najmeh Miramirkhani 1, Hamid Reza Mahrooghi 1, Rasool Jalili 1 1 Sharif University of Technology,Tehran, Iran {miramirkhani@ce., mahrooghi@ce.,

More information

Remote E-Voting System

Remote E-Voting System Remote E-Voting System Crypto2-Spring 2013 Benjamin Kaiser Jacob Shedd Jeremy White Phases Initialization Registration Voting Verifying Activities Trusted Authority (TA) distributes 4 keys to Registrar,

More information

A new secure and practical electronic voting protocol without revealing voters identity

A new secure and practical electronic voting protocol without revealing voters identity A new secure and practical electronic voting protocol without revealing voters identity Sadegh Jafari Computer Engineering Department Islamic Azad University, Zanjan Branch Zanjan, Iran jafari.s66@gmail.com

More information

Elector8 Training and Instruction Document New Elector Wizard

Elector8 Training and Instruction Document New Elector Wizard Elector8 Training and Instruction Document New Elector Wizard Version Control Version No. Author Change Details Date 1.0.0 S Verdon Initial Version of Elector8 Manual October 2010 1.3.1 M Warner Review

More information

A Generic Interface for the Public Bulletin Board Used in UniVote

A Generic Interface for the Public Bulletin Board Used in UniVote 2016 International 2016 Conference Conference for E-Democracy for E-Democracy and Open and Government Open Government A Generic Interface for the Public Bulletin Board Used in UniVote Severin Hauser, Rolf

More information

Du-Vote: Remote Electronic Voting with Untrusted Computers

Du-Vote: Remote Electronic Voting with Untrusted Computers Du-Vote: Remote Electronic Voting with Untrusted Computers Gurchetan S. Grewal School of Computer Science, University of Birmingham, UK research@gurchetan.com Mark D. Ryan School of Computer Science, University

More information

Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents

Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents Mark A. Will, Brandon Nicholson, Marc Tiehuis and Ryan K L Ko Cyber Security Lab The University of Waikato Hamilton, New Zealand

More information

SO OS Secure Online Voting System

SO OS Secure Online Voting System Johns Hopkins Engineering for Professionals Secure Online Voting System Systems Engineering Project Oral Presentation Haijing Henry Chen May 1, 2018 Agenda Introduction Proposed System Deliverables Requirement

More information

CSIRO ENTERPRISE AGREEMENT

CSIRO ENTERPRISE AGREEMENT Proposed CSIRO ENTERPRISE AGREEMENT 2016-2020 Employee Ballot FREQUENTLY ASKED QUESTIONS NOTE: This FAQ document has been prepared by Richard Kidd, Australian Election Company as Returning Officer for

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 23

CIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 23 CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 23 Announcements Project 4 is Due Friday May 2nd at 11:59 PM Final exam: Friday, May 12th. Noon - 2:00pm DRLB A6 Today: Last details

More information

Comparison of e-voting schemes: Estonian and Norwegian solutions

Comparison of e-voting schemes: Estonian and Norwegian solutions Comparison of e-voting schemes: Estonian and Norwegian solutions M J morshed Chowdhury morshed@ut.ee NordSecMob, University of Tartu Abstract. In October 2005, Estonia organized country-wide remote Internet

More information

To Du or not to Du: A Security Analysis of Du-Vote

To Du or not to Du: A Security Analysis of Du-Vote To Du or not to Du: A Security Analysis of Du-Vote Steve Kremer, Peter Rønne To cite this version: Steve Kremer, Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. IEEE European Symposium

More information

E-Voting System based on Mobile using NIC and SIM

E-Voting System based on Mobile using NIC and SIM E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.

More information

A secure and available electronic voting service for a large-scale distributed system

A secure and available electronic voting service for a large-scale distributed system Future Generation Computer Systems 19 (2003) 69 85 A secure and available electronic voting service for a large-scale distributed system Gianluca Dini Dipartimento di Ingegneria della Informazione: Elettronica,

More information

Anonymous and Transparent E-Voting System

Anonymous and Transparent E-Voting System Distributed Computing Anonymous and Transparent E-Voting System Bachelor Thesis Lucien Schaller slucien@student.ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich

More information

An Elliptic Curve Based Homomorphic Remote Voting System

An Elliptic Curve Based Homomorphic Remote Voting System RECSI 2014, Alicante, 2-5 septiembre 2014 An Elliptic Curve Based Homomorphic Remote Voting System M.A. Cerveró V. Mateu J.M. Miret F. Sebé J. Valera Dept. Matemàtica, Universitat de Lleida. Jaume II,

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Lynda.com Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative

More information

A Hybrid Touch Interface for Prêt àvoter. Chris Culnane, University of Surrey Trustworthy Voting Systems Project

A Hybrid Touch Interface for Prêt àvoter. Chris Culnane, University of Surrey Trustworthy Voting Systems Project A Hybrid Touch Interface for Prêt àvoter Chris Culnane, University of Surrey Trustworthy Voting Systems Project Overview Brief Introduction to Prêt àvoter Motivation Hybrid Touch Concept Implementation

More information

Lecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena

Lecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena Lecture 8: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson Course Admin HW/Lab 3

More information

Type-Based Verification of Electronic Voting Systems

Type-Based Verification of Electronic Voting Systems saarland university computer science Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Master s Program in Computer Science Master s Thesis Type-Based Verification

More information

Platform-independent Secure Blockchain-Based Voting System

Platform-independent Secure Blockchain-Based Voting System Platform-independent Secure Blockchain-Based Voting System Bin Yu 1, Joseph Liu 1, Amin Sakzad 1, Surya Nepal 2, Ron Steinfeld 1, Paul Rimba 2, and Man Ho Au 3 1 Monash University Australia 2 CSIRO Australia

More information

Purpose. Symptom. Cause. March 4, 2008

Purpose. Symptom. Cause. March 4, 2008 March 4, 2008 To: From: AVC Advantage Customers using series 9.0 firmware Joe McIntyre, Senior Project/Account Manager Re: WinEDS Technical Product Bulletin - AVC Advantage Party Turnout Issue / Operator

More information

Decentralized E-Voting on Android Devices Using Homomorphic Tallying

Decentralized E-Voting on Android Devices Using Homomorphic Tallying Master s Thesis Decentralized E-Voting on Android Devices Using Homomorphic Tallying Jürg Ritter Bern University of Applied Sciences Engineering and Information Technology CH-2501 Biel, Switzerland February

More information

Blockchain Based E-Voting Recording System Design

Blockchain Based E-Voting Recording System Design Blockchain Based E-Voting Recording System Design Rifa Hanifatunnisa (Author) School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung, West Java, Indonesia rifahani@students.itb.ac.id

More information

ErgoGroup. E-vote 2011 Security Architecture Electronic counting of paper votes V 1.1

ErgoGroup. E-vote 2011 Security Architecture Electronic counting of paper votes V 1.1 ErgoGroup E-vote 2011 Security Architecture Electronic counting of paper votes V 1.1 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership

More information

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURITY ENHANCEMENT OF E-VOTING SYSTEM SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses

More information

Performance Optimization of a Split-Value Voting System. Charles Z. Liu

Performance Optimization of a Split-Value Voting System. Charles Z. Liu Performance Optimization of a Split-Value Voting System by Charles Z. Liu Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree

More information

Total value of options. % of total contract value. Total payment in NOK

Total value of options. % of total contract value. Total payment in NOK Appendix 7 Total price and pricing provisions All costs in NOK excluded VAT/MVA Date 25.10.09 Company Name Exchange rate used Currency used ErgoGroup AS NOK Totals (Sum from tables 1 7 below) Total contract

More information

Two Simple Code-Verification Voting Protocols

Two Simple Code-Verification Voting Protocols Two Simple Code-Verification Voting Protocols Helger Lipmaa 1 Cybernetica AS, Estonia 2 Tallinn University, Estonia Abstract. Norwegian nationwide Internet voting will make use of a setting that we will

More information

KEY MILESTONES TIMELINE

KEY MILESTONES TIMELINE FEB JAN KEY MILESTONES TIMELINE LOCAL GOVERNMENT ELECTIONS SCOTLAND 4 MAY 2017 (All Products) 27 Jan 10:00 Live Election available on EasyPrint 1 Feb * By 11:00 Variable data confirmed order screen confirmed

More information

Distributed-Application Security

Distributed-Application Security Distributed-Application Security Spam Spams Spam referred to unsolicited bulk email Spam emails contain advertisement, viruses, malware Spams emails are used to gather information about the victim Harvesting

More information

Automatic Verification of Remote Electronic Voting Protocols

Automatic Verification of Remote Electronic Voting Protocols Automatic Verification of Remote Electronic Voting Protocols Cătălin Hrițcu Saarland University, Saarbrücken, Germany Joint work with: Michael Backes and Matteo Maffei Microsoft Research Cambridge, July

More information

SE 1: Software Requirements Specification and Analysis

SE 1: Software Requirements Specification and Analysis SE 1: Software Requirements Specification and Analysis Lecture 11: User Interface Specification Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 U Waterloo SE1

More information

Kleptographic Attacks on E-Voting Schemes

Kleptographic Attacks on E-Voting Schemes Kleptographic Attacks on E-Voting Schemes Marcin Gogolewski 1, Marek Klonowski 2, Przemek Kubiak 2 Mirek Kutyłowski 2, Anna Lauks 2, Filip Zagórski 2 1 Faculty of Mathematics and Computer Science, Adam

More information

Identity-Based Threshold Cryptography for Electronic Voting

Identity-Based Threshold Cryptography for Electronic Voting Identity-Based Threshold Cryptography for Electronic Voting GINA GALLEGOS-GARCÍA 1, ROBERTO GÓMEZ-CÁRDENAS 2, GONZALO I. DUCHÉN-SÁNCHEZ 1 1 Graduate School, 2 Department of Computer Science 1 Instituto

More information

APPLICATIONS AND PROTOCOLS. Mihir Bellare UCSD 1

APPLICATIONS AND PROTOCOLS. Mihir Bellare UCSD 1 APPLICATIONS AND PROTOCOLS Mihir Bellare UCSD 1 Some applications and protocols Internet Casino Commitment Shared coin flips Threshold cryptography Forward security Program obfuscation Zero-knowledge Certified

More information

ISO/IEC JTC 1/SC 27 N7769

ISO/IEC JTC 1/SC 27 N7769 ISO/IEC JTC 1/SC 27 N7769 REPLACES: N ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany DOC TYPE: officer's contribution TITLE: SC 27 Presentation to ITU-T Workshop

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Entity authentication assurance framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Entity authentication assurance framework INTERNATIONAL STANDARD ISO/IEC 29115 First edition 2013-04-01 Information technology Security techniques Entity authentication assurance framework Technologies de l'information Techniques de sécurité Cadre

More information

Acknowledgments/Transfers/Confirmations

Acknowledgments/Transfers/Confirmations Acknowledgments/Transfers/Confirmations STATISTICAL REPORTING REQUIREMENTS The State Board compiles an annual report which details the impact and productivity of the NVRA. Surveys are sent to County Boards.

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Block Chain Voting System

Block Chain Voting System Block Chain Voting System SAGAR SHAH QAISH KANCHWALA HUAIQIAN MI FROM NORTHEASTERN UNIVERSITY Table of Contents Executive Summary... 3 Introduction... 4 Proposed System... 5 Architecture...5 Parts of the

More information

More crypto and security

More crypto and security More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade

More information

Application for anonymous registration. How do I register as an anonymous elector? Returning the form. More information

Application for anonymous registration. How do I register as an anonymous elector? Returning the form. More information Application for anonymous registration You need to be on the electoral register to vote in elections and referendums. If the safety of you (or someone in your household) would be at risk if your name or

More information

Trustworthy user authentication, authorization, data integrity AND consent management

Trustworthy user authentication, authorization, data integrity AND consent management RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY

More information

CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE VOTING SYSTEM

CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE VOTING SYSTEM CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE 1.4.1 VOTING SYSTEM The Secretary of State promulgates the following conditions for use for Clear Ballot Group s ClearVote 1.4.1 voting system by political

More information

Ticket granting. Voting S. Ticket counting

Ticket granting. Voting S. Ticket counting Anonymous Secure E-oting over a Network Yi Mu and ijay aradharajan School of Computing & IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, NSW 2747, Australia Email: fyimu,vijayg@st.nepean.uws.edu.au

More information

DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM

DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM CHAPTER 5 DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM At present, the two ways of vote casting are Paper- Ballot system and Electronic Voting Machine (EVM). Both these methods do not ensure

More information

MATH 1340 Mathematics & Politics

MATH 1340 Mathematics & Politics MTH 1340 Mathematics & Politics Lecture 4 June 25, 2015 Slides prepared by Iian Smythe for MTH 1340, Summer 2015, at Cornell University 1 Profiles and social choice functions Recall from last time: in

More information

Type-Based Verification of Electronic Voting Protocols

Type-Based Verification of Electronic Voting Protocols Type-Based Verification of Electronic Voting Protocols Véronique Cortier 1, Fabienne Eigner 2, Steve Kremer 1, Matteo Maffei 2, and Cyrille Wiedling 3 1 LORIA, CNRS & INRIA & University of Lorraine, France

More information

A privacy-enhancing technology:

A privacy-enhancing technology: A privacy-enhancing technology: sticky policies Privacy-Enhancing Technologies / DD3344 Guillermo Rodríguez Cano Stockholm, November 12th, 2012 what are they? how do they work? what are their problems?

More information

Election Night Reporting Quick Start Guide

Election Night Reporting Quick Start Guide Election Night Reporting Quick Start Guide The Election Night Reporting (ENR) display provides extensive details on election results. Web visitors can view which candidates are leading for a contest as

More information

msis Security Policy and Protocol

msis Security Policy and Protocol msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Society of Chemistry Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i Security protocols Logical representation and analysis of protocols.i A security protocol is a set of rules, adhered to by the communication parties in order to ensure achieving various security or privacy

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Pretty Good Voting. 1 Introduction. Christian Bell Jason Duell Amir Kamil. December 20, 2004

Pretty Good Voting. 1 Introduction. Christian Bell Jason Duell Amir Kamil. December 20, 2004 Pretty Good Voting Christian Bell Jason Duell Amir Kamil December 20, 2004 1 Introduction Recent academic assessments of the potential for secure Internet-based voting have been extremely pessimistic A

More information

MATH 1340 Mathematics & Politics

MATH 1340 Mathematics & Politics MATH 1340 Mathematics & Politics Lecture 5 June 26, 2015 Slides prepared by Iian Smythe for MATH 1340, Summer 2015, at Cornell University 1 An example (Exercise 2.1 in R&U) Consider the following profile

More information

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Master of Science Project. An Internet-Based Voting System for Student Government Elections

Master of Science Project. An Internet-Based Voting System for Student Government Elections Master of Science Project An Internet-Based Voting System for Student Government Elections Sungho Maeung Computer Science Department Rochester Institute of Technology July 27, 2005

More information

EVT/WOTE 09 AUGUST 10, Ersin Öksüzoğlu Dan S. Wallach

EVT/WOTE 09 AUGUST 10, Ersin Öksüzoğlu Dan S. Wallach EVT/WOTE 09 AUGUST 10, 2009 Ersin Öksüzoğlu Dan S. Wallach VoteBox Full featured DRE voting machine Paper in USENIX Security Symposium 2008 2 Pre-rendered user interface simplifies the graphics subsystem

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Auditable Privacy: On Tamper-evident Mix Networks

Auditable Privacy: On Tamper-evident Mix Networks Auditable Privacy: On Tamper-evident Mix Networks Jong Youl Choi 1, Philippe Golle 2, and Markus Jakobsson 3 1 Dept of Computer Science, Indiana University at Bloomington, IN 47405, USA ychoi@csindianaedu

More information

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal 1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for

More information

19.1. Security must consider external environment of the system, and protect it from:

19.1. Security must consider external environment of the system, and protect it from: Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external

More information

Scaling Privacy Guarantees in Code Verification Elections

Scaling Privacy Guarantees in Code Verification Elections Scaling Privacy Guarantees in Code Verification Elections Anthi Orfanou Columbia University July 18, 2013 Joint work with Aggelos Kiayias (University of Athens) Anthi Orfanou (Columbia University) Scaling

More information

CRYPTOGRAPHIC PROTOCOLS: REVOCABLE ANONYMITY AND E-VOTING

CRYPTOGRAPHIC PROTOCOLS: REVOCABLE ANONYMITY AND E-VOTING CRYPTOGRAPHIC PROTOCOLS: REVOCABLE ANONYMITY AND E-VOTING By BEKİR ARSLAN A PROPOSAL PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE

More information

Maritime Union of Australia. Privacy Policy 2014

Maritime Union of Australia. Privacy Policy 2014 Maritime Union of Australia Privacy Policy 2014 Introduction The Maritime Union of Australia (Union) is the Union representing persons employed in diving, ferries, offshore oil and gas, port services,

More information

Remote Poll-Site Voting

Remote Poll-Site Voting Remote Poll-Site Voting Submission for Phase II by Parth P. Vasa Soo-Yung Cho Jeremy Mullendore Bodhisattva Debnath 1 Contents 1. Introduction 2. A use case scenario 3. Details of Components a. Authentication

More information

Building Trust in Digital Identities

Building Trust in Digital Identities Building Trust in Digital Identities Secure Digital identities for a Digital Single Market in Europe Frederic Jacobs What is trust? the willingness of a party to be vulnerable to the actions of another

More information

Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox. Introduction

Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox. Introduction Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox Introduction Citizens expect the voting process to be open and transparent and at the same time secure. When transferred to the digital

More information

Homomorphic Encryption

Homomorphic Encryption Homomorphic Encryption Travis Mayberry Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Northeastern saves money on infrastructure and gets the benefit of redundancy and

More information

Security System for Mobile Voting with Biometrics

Security System for Mobile Voting with Biometrics Security System for Mobile Voting with Biometrics Laurențiu MARINESCU IT&C Security Master Department of Economic Informatics and Cybernetics The Bucharest University of Economic Studies ROMANIA laurr.marinescu@gmail.com

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Fraser & Hoyt Incentives Ltd. Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

VoteBox: a verifiable, tamper-evident electronic voting system

VoteBox: a verifiable, tamper-evident electronic voting system VoteBox: a verifiable, tamper-evident electronic voting system Daniel R. Sandler Rice University February 17, 2009 The Johns Hopkins University Talk outline Background Trustworthiness of electronic voting

More information

Election Night Reporting Guidebook. County of Santa Clara Barry Garner Registrar of Voters

Election Night Reporting Guidebook. County of Santa Clara Barry Garner Registrar of Voters Election Night Reporting Guidebook County of Santa Clara Barry Garner Registrar of Voters Last Updated: October 16, 2012 Table of Contents Overview of Santa Clara County Election Night Reporting... 3 How

More information

Stakeholder and community feedback. Trusted Digital Identity Framework

Stakeholder and community feedback. Trusted Digital Identity Framework Stakeholder and community feedback Trusted Digital Identity Framework Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and the rights explicitly

More information

Voter Record Information Verification Process Overview. Jennifer Brunner Ohio Secretary of State

Voter Record Information Verification Process Overview. Jennifer Brunner Ohio Secretary of State Voter Record Information Verification Process Overview Jennifer Brunner Ohio Secretary of State Key Components Memorandum of Understanding (MOU) BMV/SSA Voter Record Information Verification Process SOS

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name Wilfrid Laurier University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

Formal Methods for Assuring Security of Computer Networks

Formal Methods for Assuring Security of Computer Networks for Assuring of Computer Networks May 8, 2012 Outline Testing 1 Testing 2 Tools for formal methods Model based software development 3 Principals of security Key security properties Assessing security protocols

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

Royal Pharmaceutical Society Elections to the National Pharmacy Boards 2017

Royal Pharmaceutical Society Elections to the National Pharmacy Boards 2017 Royal Pharmaceutical Society Elections to the National Pharmacy Boards 2017 Report to: - Alison Douglas, Business and Governance Manager From: - Craig Poyser, Customer Services and Production Manager Compiled

More information

Implementation of Aadhaar Based EVM

Implementation of Aadhaar Based EVM Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:

More information

Anonymity and Privacy

Anonymity and Privacy Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: University of Guelph Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

NetBeans IDE Java Quick Start Tutorial

NetBeans IDE Java Quick Start Tutorial NetBeans IDE Java Quick Start Tutorial Welcome to NetBeans IDE! This tutorial provides a very simple and quick introduction to the NetBeans IDE workflow by walking you through the creation of a simple

More information

An evoting platform for QoE evaluation

An evoting platform for QoE evaluation An evoting platform for QoE evaluation José Luis Tornos, José Luis Salazar and Joan Josep Piles Communication Technologies Group University of Zaragoza {jltornos, jsalazar, jpiles}@unizar.es Abstract Electronic

More information