Verifiability experiences in government online voting
|
|
- Doris Joseph
- 5 years ago
- Views:
Transcription
1 Verifiability experiences in government online voting E-Vote-ID 2017 Jordi Puiggalí CSO and SVP of Research & Security Scytl Secure Electronic Voting October, 2017
2 Online voting security and verifiability Government adoption
3 Security and verifiability Privacy & Integrity Anonymous tally Neuchâtel Geneva Privacy & Integrity E2E encryption Standard security
4 Security and verifiability Verifiability Auditability Privacy & Integrity Universal verifiability Individual verifiability Anonymous tally E2E encryption Standard security Neuchâtel Geneva Neuchâtel Geneva
5 Verifiability
6 Verifiability Types of verifiability Vote preparation Vote casting Vote reception Vote Cast-as-intended Recorded-as-cast Electoral board Individual verifiability Based on what is verified Universal verifiability Eligibility verification Counted-as-recorded Vote counting Based on who verifies 6
7 Verifiability Implementations Cast-as-intended Return Codes: Norway and Switzerland Cast and decrypt: Estonia and Australia (NSW) Cast or cancel: used by Helios but not adopted by governments Recorded-as-cast Voting receipts: Norway and Switzerland Embedded in cast-as-intended proof: Estonia and Australia Counted-as-recorded Verifiable mixnet: Norway and Switzerland Homomorphic tally: none of the governments implemented it 7
8 Verifiability Provable security How is possible to verify if verifiability properties are properly designed? Provable security Provable security uses security (cryptographic) and/or formal (symbolic) proofs to define the security properties of the system Security proofs are based on modeling the security of the protocol in front an adversary. Formal proofs use an specific mathematical formal algebra to represent the protocol and test it using an automated formal framework. 8
9 Verifiability Source code publication Source code publication provides transparency /** * The HelloWorldApp class implements an application that * simply prints "Hello World!" to standard output. */ class HelloWorldApp { public static void main(string[] args) { System.out.println("Hello World!"); // Display the string. } } But not verifiability Publishing source code does not ensure that there are no security errors in the code that can be exploited (e.g., Washington DC project) Publishing the source code does not ensure that this code is the same one used by the voter to cast a vote Election accuracy should be independent from software audits: software independence 9
10 Verifiability Vote correctness Voting Server Ballot Box Internet Checks if vote is valid without decryption Types of votes correctness: Before casting the vote: warns voters against incorrect selections. Before storing the vote in the Ballot Box: checks contents of received votes (without compromising voter privacy) Before counting the votes: prevents counting invalid votes 10
11 Verifiability Framework The analysis of implemented voting system will evaluate the following parameters: Cast-as-intended implementation Recorded-as-cast implementation Counted-as-recorded implementation Voter verification usage Publication of source code Provable security Other properties (e.g., vote correctness) 11
12 Verifiability in government implementations Government adoption
13 Government implementations Norway Voter Encrypted vote Operates encrypted vote Operated vote Operates encrypted vote Voting card Verifies return codes Online voting server Return codes Sends return codes 13
14 Government implementations Estonia 1 Cast Voter Encrypted vote Stores encrypted vote 1 2 Verification bar code 3 4 Vote identifier 5 Online voting system server 2 Verify Encrypted vote 6 Vote decryption 14.
15 Government implementations Switzerland SwissPost/Scytl 1 Cast & verify Voter 1 Encrypted vote + verification proof Return Codes from encrypted vote 2 Voting card Verifies Return Codes 4 Return codes 3 Internet Encrypted vote Online voting system server 2 Confirm Voting card Voter 5 Validation code Internet Operates validation code 6 Verifies Finalization Code Finalization code 7 Online voting system server 15.
16 Government implementations Switzerland Geneva 1 Cast & verify Voter 1 Return Codes from clear text vote 2 Verifies Return Codes Voting card 4 return codes 3 Internet Clear-text vote Online voting system server 2 Confirm Voter 5 Validation code Operates validation code 6 Verifies Finalization Code Voting card 8 7 Finalization code Internet Online voting system server 16.
17 Government implementations Australia New South Wales 1 Cast Voter 1 Encrypted + verification vote Stores encrypted vote 2 Receipt number Online voting system 2 Verify Credential + Receipt Number 4 Stores verification vote 3 Vote contents 6 Internet Verification system 5 Decrypts verification vote 17.
18 Norway Estonia Switzerland (Swiss Post) Cast-as-intended Return codes Decryption in device Recorded-as-cast At any time Up to 1 hour with receipts Counted-as-recorded Verifiable None mixnet Voter verification 70% (small sample) 4% (large sample) Government implementations Switzerland (Geneva) Summary Australia (NSW) Return codes Return codes Decryption in server After counting None None with receipts Verifiable None Vote reencryption mixnet Unknown Unknown 1% (large sample) Public source code All the system Only server None Only counting None side + verifier side Vote correctness Yes None Yes Yes None Provable security Yes (Individual None Yes (Individual None None and Universal) and Universal) E2E encryption Yes Yes Yes No Yes 18
19 Conclusions
20 Not enough case studies to point a specific model as example of best practice, but Norway and Switzerland still the ones that have made so far more efforts Cast-as-intended implementation is more adopted than counted-asrecoded Governments still keep trust on server side and do not broad adopt universal verifiability Only two system provides full verifiability: Norway and Switzerland (SwissPost) Publication of source code is usually partial and full disclosure is linked to achieve full verifiability to avoid risks Provable security is gaining on acceptance to evaluate the correct implementation of the security properties (mainly verifiability) Conclusions Analysis 20
21 Any Questions?
22
A proposal for verifiable intra-institutional elections over Plone
A proposal for verifiable intra-institutional elections over Plone Sergio Rajsbaum Universidad Nacional Autónoma de México (UNAM) Plone Symposium East 2011 The case of the Institute of Mathematics (UNAM)
More informationReturn Code Schemes for Electronic Voting Systems
Return Code Schemes for Electronic Voting Systems Shahram Khazaei Douglas Wikström Sharif University of Technology, Iran KTH Royal Institute of Technology, Sweden E-Vote-ID 2017 Presented by: Johannes
More informationScratch & Vote: Self-Contained Paper-Based Cryptographic Voting
Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting Ben Adida Ronald L. Rivest 30 October 2006 The Next Harvard Pres! Chain of Custody Chain of Custody /* * source * code */ 1 if (... Vendor
More informationThreat Assessment Summary. e-voting, Admin, and pvoting TOE s
Threat Assessment Summary e-voting, Admin, and pvoting TOE s, 2011 Page 1 of 22 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership
More informationCryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, khazaei@kth.se Björn Terelius, terelius@kth.se Douglas Wikström, dog@csc.kth.se February 24, 2012 Abstract We study
More informationPrivacy Enhancing Technologies CSE 701 Fall 2017
Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,
More informationThe nominative data coming from the population registry and used to generate the voting cards are never stored in the evoting system database.
System overview Legal compliance CHVote complies to the swiss federal chancellery ordinance on Electronic Voting (VEleS) for an evoting system offered up to 30% of the resident voters. The election process
More informationBlind Signatures and Their Applications
Department of Computer Science, National Chiao Tung University 1 / 15 Cryptanalysis Lab Outline 1 Digital Signature 2 Blind signature 3 Partially blind signature 2 / 15 Cryptanalysis Lab Digital Signature
More informationVoting System Security as per the VVSG
Voting System Security as per the VVSG Austin Conference on State Certification Testing for Voting Systems (2017) Michael Santos Test Manager SLI Compliance Elements of Security Outside Vendor Control
More informationA Survey of Modern Electronic Voting Technologies
A Survey of Modern Electronic Voting Technologies Martine Stenbro Master of Science in Communication Technology Submission date: June 2010 Supervisor: Danilo Gligoroski, ITEM Norwegian University of Science
More informationNorwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5051 5063 Published online 2 November 2016 in Wiley Online Library (wileyonlinelibrary.com)..1678 RESEARCH ARTICLE Norwegian internet
More informationAnalysis of an E-voting Protocol using the Inductive Method
Analysis of an E-voting Protocol using the Inductive Method Najmeh Miramirkhani 1, Hamid Reza Mahrooghi 1, Rasool Jalili 1 1 Sharif University of Technology,Tehran, Iran {miramirkhani@ce., mahrooghi@ce.,
More informationRemote E-Voting System
Remote E-Voting System Crypto2-Spring 2013 Benjamin Kaiser Jacob Shedd Jeremy White Phases Initialization Registration Voting Verifying Activities Trusted Authority (TA) distributes 4 keys to Registrar,
More informationA new secure and practical electronic voting protocol without revealing voters identity
A new secure and practical electronic voting protocol without revealing voters identity Sadegh Jafari Computer Engineering Department Islamic Azad University, Zanjan Branch Zanjan, Iran jafari.s66@gmail.com
More informationElector8 Training and Instruction Document New Elector Wizard
Elector8 Training and Instruction Document New Elector Wizard Version Control Version No. Author Change Details Date 1.0.0 S Verdon Initial Version of Elector8 Manual October 2010 1.3.1 M Warner Review
More informationA Generic Interface for the Public Bulletin Board Used in UniVote
2016 International 2016 Conference Conference for E-Democracy for E-Democracy and Open and Government Open Government A Generic Interface for the Public Bulletin Board Used in UniVote Severin Hauser, Rolf
More informationDu-Vote: Remote Electronic Voting with Untrusted Computers
Du-Vote: Remote Electronic Voting with Untrusted Computers Gurchetan S. Grewal School of Computer Science, University of Birmingham, UK research@gurchetan.com Mark D. Ryan School of Computer Science, University
More informationSecure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents Mark A. Will, Brandon Nicholson, Marc Tiehuis and Ryan K L Ko Cyber Security Lab The University of Waikato Hamilton, New Zealand
More informationSO OS Secure Online Voting System
Johns Hopkins Engineering for Professionals Secure Online Voting System Systems Engineering Project Oral Presentation Haijing Henry Chen May 1, 2018 Agenda Introduction Proposed System Deliverables Requirement
More informationCSIRO ENTERPRISE AGREEMENT
Proposed CSIRO ENTERPRISE AGREEMENT 2016-2020 Employee Ballot FREQUENTLY ASKED QUESTIONS NOTE: This FAQ document has been prepared by Richard Kidd, Australian Election Company as Returning Officer for
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 23
CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 23 Announcements Project 4 is Due Friday May 2nd at 11:59 PM Final exam: Friday, May 12th. Noon - 2:00pm DRLB A6 Today: Last details
More informationComparison of e-voting schemes: Estonian and Norwegian solutions
Comparison of e-voting schemes: Estonian and Norwegian solutions M J morshed Chowdhury morshed@ut.ee NordSecMob, University of Tartu Abstract. In October 2005, Estonia organized country-wide remote Internet
More informationTo Du or not to Du: A Security Analysis of Du-Vote
To Du or not to Du: A Security Analysis of Du-Vote Steve Kremer, Peter Rønne To cite this version: Steve Kremer, Peter Rønne. To Du or not to Du: A Security Analysis of Du-Vote. IEEE European Symposium
More informationE-Voting System based on Mobile using NIC and SIM
E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.
More informationA secure and available electronic voting service for a large-scale distributed system
Future Generation Computer Systems 19 (2003) 69 85 A secure and available electronic voting service for a large-scale distributed system Gianluca Dini Dipartimento di Ingegneria della Informazione: Elettronica,
More informationAnonymous and Transparent E-Voting System
Distributed Computing Anonymous and Transparent E-Voting System Bachelor Thesis Lucien Schaller slucien@student.ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich
More informationAn Elliptic Curve Based Homomorphic Remote Voting System
RECSI 2014, Alicante, 2-5 septiembre 2014 An Elliptic Curve Based Homomorphic Remote Voting System M.A. Cerveró V. Mateu J.M. Miret F. Sebé J. Valera Dept. Matemàtica, Universitat de Lleida. Jaume II,
More informationSecurity Technologies for Dynamic Collaboration
Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Lynda.com Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative
More informationA Hybrid Touch Interface for Prêt àvoter. Chris Culnane, University of Surrey Trustworthy Voting Systems Project
A Hybrid Touch Interface for Prêt àvoter Chris Culnane, University of Surrey Trustworthy Voting Systems Project Overview Brief Introduction to Prêt àvoter Motivation Hybrid Touch Concept Implementation
More informationLecture 8: Privacy and Anonymity Using Anonymizing Networks. CS 336/536: Computer Network Security Fall Nitesh Saxena
Lecture 8: Privacy and Anonymity Using Anonymizing Networks CS 336/536: Computer Network Security Fall 2015 Nitesh Saxena Some slides borrowed from Philippe Golle, Markus Jacobson Course Admin HW/Lab 3
More informationType-Based Verification of Electronic Voting Systems
saarland university computer science Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Master s Program in Computer Science Master s Thesis Type-Based Verification
More informationPlatform-independent Secure Blockchain-Based Voting System
Platform-independent Secure Blockchain-Based Voting System Bin Yu 1, Joseph Liu 1, Amin Sakzad 1, Surya Nepal 2, Ron Steinfeld 1, Paul Rimba 2, and Man Ho Au 3 1 Monash University Australia 2 CSIRO Australia
More informationPurpose. Symptom. Cause. March 4, 2008
March 4, 2008 To: From: AVC Advantage Customers using series 9.0 firmware Joe McIntyre, Senior Project/Account Manager Re: WinEDS Technical Product Bulletin - AVC Advantage Party Turnout Issue / Operator
More informationDecentralized E-Voting on Android Devices Using Homomorphic Tallying
Master s Thesis Decentralized E-Voting on Android Devices Using Homomorphic Tallying Jürg Ritter Bern University of Applied Sciences Engineering and Information Technology CH-2501 Biel, Switzerland February
More informationBlockchain Based E-Voting Recording System Design
Blockchain Based E-Voting Recording System Design Rifa Hanifatunnisa (Author) School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung, West Java, Indonesia rifahani@students.itb.ac.id
More informationErgoGroup. E-vote 2011 Security Architecture Electronic counting of paper votes V 1.1
ErgoGroup E-vote 2011 Security Architecture Electronic counting of paper votes V 1.1 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership
More informationSECURITY ENHANCEMENT OF E-VOTING SYSTEM
SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses
More informationPerformance Optimization of a Split-Value Voting System. Charles Z. Liu
Performance Optimization of a Split-Value Voting System by Charles Z. Liu Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree
More informationTotal value of options. % of total contract value. Total payment in NOK
Appendix 7 Total price and pricing provisions All costs in NOK excluded VAT/MVA Date 25.10.09 Company Name Exchange rate used Currency used ErgoGroup AS NOK Totals (Sum from tables 1 7 below) Total contract
More informationTwo Simple Code-Verification Voting Protocols
Two Simple Code-Verification Voting Protocols Helger Lipmaa 1 Cybernetica AS, Estonia 2 Tallinn University, Estonia Abstract. Norwegian nationwide Internet voting will make use of a setting that we will
More informationKEY MILESTONES TIMELINE
FEB JAN KEY MILESTONES TIMELINE LOCAL GOVERNMENT ELECTIONS SCOTLAND 4 MAY 2017 (All Products) 27 Jan 10:00 Live Election available on EasyPrint 1 Feb * By 11:00 Variable data confirmed order screen confirmed
More informationDistributed-Application Security
Distributed-Application Security Spam Spams Spam referred to unsolicited bulk email Spam emails contain advertisement, viruses, malware Spams emails are used to gather information about the victim Harvesting
More informationAutomatic Verification of Remote Electronic Voting Protocols
Automatic Verification of Remote Electronic Voting Protocols Cătălin Hrițcu Saarland University, Saarbrücken, Germany Joint work with: Michael Backes and Matteo Maffei Microsoft Research Cambridge, July
More informationSE 1: Software Requirements Specification and Analysis
SE 1: Software Requirements Specification and Analysis Lecture 11: User Interface Specification Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 U Waterloo SE1
More informationKleptographic Attacks on E-Voting Schemes
Kleptographic Attacks on E-Voting Schemes Marcin Gogolewski 1, Marek Klonowski 2, Przemek Kubiak 2 Mirek Kutyłowski 2, Anna Lauks 2, Filip Zagórski 2 1 Faculty of Mathematics and Computer Science, Adam
More informationIdentity-Based Threshold Cryptography for Electronic Voting
Identity-Based Threshold Cryptography for Electronic Voting GINA GALLEGOS-GARCÍA 1, ROBERTO GÓMEZ-CÁRDENAS 2, GONZALO I. DUCHÉN-SÁNCHEZ 1 1 Graduate School, 2 Department of Computer Science 1 Instituto
More informationAPPLICATIONS AND PROTOCOLS. Mihir Bellare UCSD 1
APPLICATIONS AND PROTOCOLS Mihir Bellare UCSD 1 Some applications and protocols Internet Casino Commitment Shared coin flips Threshold cryptography Forward security Program obfuscation Zero-knowledge Certified
More informationISO/IEC JTC 1/SC 27 N7769
ISO/IEC JTC 1/SC 27 N7769 REPLACES: N ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany DOC TYPE: officer's contribution TITLE: SC 27 Presentation to ITU-T Workshop
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Entity authentication assurance framework
INTERNATIONAL STANDARD ISO/IEC 29115 First edition 2013-04-01 Information technology Security techniques Entity authentication assurance framework Technologies de l'information Techniques de sécurité Cadre
More informationAcknowledgments/Transfers/Confirmations
Acknowledgments/Transfers/Confirmations STATISTICAL REPORTING REQUIREMENTS The State Board compiles an annual report which details the impact and productivity of the NVRA. Surveys are sent to County Boards.
More informationU.S. E-Authentication Interoperability Lab Engineer
Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationBlock Chain Voting System
Block Chain Voting System SAGAR SHAH QAISH KANCHWALA HUAIQIAN MI FROM NORTHEASTERN UNIVERSITY Table of Contents Executive Summary... 3 Introduction... 4 Proposed System... 5 Architecture...5 Parts of the
More informationMore crypto and security
More crypto and security CSE 199, Projects/Research Individual enrollment Projects / research, individual or small group Implementation or theoretical Weekly one-on-one meetings, no lectures Course grade
More informationApplication for anonymous registration. How do I register as an anonymous elector? Returning the form. More information
Application for anonymous registration You need to be on the electoral register to vote in elections and referendums. If the safety of you (or someone in your household) would be at risk if your name or
More informationTrustworthy user authentication, authorization, data integrity AND consent management
RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY
More informationCONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE VOTING SYSTEM
CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE 1.4.1 VOTING SYSTEM The Secretary of State promulgates the following conditions for use for Clear Ballot Group s ClearVote 1.4.1 voting system by political
More informationTicket granting. Voting S. Ticket counting
Anonymous Secure E-oting over a Network Yi Mu and ijay aradharajan School of Computing & IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, NSW 2747, Australia Email: fyimu,vijayg@st.nepean.uws.edu.au
More informationDISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM
CHAPTER 5 DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM At present, the two ways of vote casting are Paper- Ballot system and Electronic Voting Machine (EVM). Both these methods do not ensure
More informationMATH 1340 Mathematics & Politics
MTH 1340 Mathematics & Politics Lecture 4 June 25, 2015 Slides prepared by Iian Smythe for MTH 1340, Summer 2015, at Cornell University 1 Profiles and social choice functions Recall from last time: in
More informationType-Based Verification of Electronic Voting Protocols
Type-Based Verification of Electronic Voting Protocols Véronique Cortier 1, Fabienne Eigner 2, Steve Kremer 1, Matteo Maffei 2, and Cyrille Wiedling 3 1 LORIA, CNRS & INRIA & University of Lorraine, France
More informationA privacy-enhancing technology:
A privacy-enhancing technology: sticky policies Privacy-Enhancing Technologies / DD3344 Guillermo Rodríguez Cano Stockholm, November 12th, 2012 what are they? how do they work? what are their problems?
More informationElection Night Reporting Quick Start Guide
Election Night Reporting Quick Start Guide The Election Night Reporting (ENR) display provides extensive details on election results. Web visitors can view which candidates are leading for a contest as
More informationmsis Security Policy and Protocol
msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Royal Society of Chemistry Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they
More informationSecurity protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i
Security protocols Logical representation and analysis of protocols.i A security protocol is a set of rules, adhered to by the communication parties in order to ensure achieving various security or privacy
More informationISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données
INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004
More informationPretty Good Voting. 1 Introduction. Christian Bell Jason Duell Amir Kamil. December 20, 2004
Pretty Good Voting Christian Bell Jason Duell Amir Kamil December 20, 2004 1 Introduction Recent academic assessments of the potential for secure Internet-based voting have been extremely pessimistic A
More informationMATH 1340 Mathematics & Politics
MATH 1340 Mathematics & Politics Lecture 5 June 26, 2015 Slides prepared by Iian Smythe for MATH 1340, Summer 2015, at Cornell University 1 An example (Exercise 2.1 in R&U) Consider the following profile
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationMaster of Science Project. An Internet-Based Voting System for Student Government Elections
Master of Science Project An Internet-Based Voting System for Student Government Elections Sungho Maeung Computer Science Department Rochester Institute of Technology July 27, 2005
More informationEVT/WOTE 09 AUGUST 10, Ersin Öksüzoğlu Dan S. Wallach
EVT/WOTE 09 AUGUST 10, 2009 Ersin Öksüzoğlu Dan S. Wallach VoteBox Full featured DRE voting machine Paper in USENIX Security Symposium 2008 2 Pre-rendered user interface simplifies the graphics subsystem
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationAuditable Privacy: On Tamper-evident Mix Networks
Auditable Privacy: On Tamper-evident Mix Networks Jong Youl Choi 1, Philippe Golle 2, and Markus Jakobsson 3 1 Dept of Computer Science, Indiana University at Bloomington, IN 47405, USA ychoi@csindianaedu
More informationDesign and Implementation of Privacy-Preserving Surveillance. Aaron Segal
1 Design and Implementation of Privacy-Preserving Surveillance Aaron Segal Yale University May 11, 2016 Advisor: Joan Feigenbaum 2 Overview Introduction Surveillance and Privacy Privacy Principles for
More information19.1. Security must consider external environment of the system, and protect it from:
Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external
More informationScaling Privacy Guarantees in Code Verification Elections
Scaling Privacy Guarantees in Code Verification Elections Anthi Orfanou Columbia University July 18, 2013 Joint work with Aggelos Kiayias (University of Athens) Anthi Orfanou (Columbia University) Scaling
More informationCRYPTOGRAPHIC PROTOCOLS: REVOCABLE ANONYMITY AND E-VOTING
CRYPTOGRAPHIC PROTOCOLS: REVOCABLE ANONYMITY AND E-VOTING By BEKİR ARSLAN A PROPOSAL PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE
More informationMaritime Union of Australia. Privacy Policy 2014
Maritime Union of Australia Privacy Policy 2014 Introduction The Maritime Union of Australia (Union) is the Union representing persons employed in diving, ferries, offshore oil and gas, port services,
More informationRemote Poll-Site Voting
Remote Poll-Site Voting Submission for Phase II by Parth P. Vasa Soo-Yung Cho Jeremy Mullendore Bodhisattva Debnath 1 Contents 1. Introduction 2. A use case scenario 3. Details of Components a. Authentication
More informationBuilding Trust in Digital Identities
Building Trust in Digital Identities Secure Digital identities for a Digital Single Market in Europe Frederic Jacobs What is trust? the willingness of a party to be vulnerable to the actions of another
More informationTransparent Open Secure e- Voting using OASIS EML Exploring the Paradox. Introduction
Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox Introduction Citizens expect the voting process to be open and transparent and at the same time secure. When transferred to the digital
More informationHomomorphic Encryption
Homomorphic Encryption Travis Mayberry Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Northeastern saves money on infrastructure and gets the benefit of redundancy and
More informationSecurity System for Mobile Voting with Biometrics
Security System for Mobile Voting with Biometrics Laurențiu MARINESCU IT&C Security Master Department of Economic Informatics and Cybernetics The Bucharest University of Economic Studies ROMANIA laurr.marinescu@gmail.com
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Fraser & Hoyt Incentives Ltd. Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationVoteBox: a verifiable, tamper-evident electronic voting system
VoteBox: a verifiable, tamper-evident electronic voting system Daniel R. Sandler Rice University February 17, 2009 The Johns Hopkins University Talk outline Background Trustworthiness of electronic voting
More informationElection Night Reporting Guidebook. County of Santa Clara Barry Garner Registrar of Voters
Election Night Reporting Guidebook County of Santa Clara Barry Garner Registrar of Voters Last Updated: October 16, 2012 Table of Contents Overview of Santa Clara County Election Night Reporting... 3 How
More informationStakeholder and community feedback. Trusted Digital Identity Framework
Stakeholder and community feedback Trusted Digital Identity Framework Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and the rights explicitly
More informationVoter Record Information Verification Process Overview. Jennifer Brunner Ohio Secretary of State
Voter Record Information Verification Process Overview Jennifer Brunner Ohio Secretary of State Key Components Memorandum of Understanding (MOU) BMV/SSA Voter Record Information Verification Process SOS
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name Wilfrid Laurier University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they
More informationFormal Methods for Assuring Security of Computer Networks
for Assuring of Computer Networks May 8, 2012 Outline Testing 1 Testing 2 Tools for formal methods Model based software development 3 Principals of security Key security properties Assessing security protocols
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationRoyal Pharmaceutical Society Elections to the National Pharmacy Boards 2017
Royal Pharmaceutical Society Elections to the National Pharmacy Boards 2017 Report to: - Alison Douglas, Business and Governance Manager From: - Craig Poyser, Customer Services and Production Manager Compiled
More informationImplementation of Aadhaar Based EVM
Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:
More informationAnonymity and Privacy
Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Guelph Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationNetBeans IDE Java Quick Start Tutorial
NetBeans IDE Java Quick Start Tutorial Welcome to NetBeans IDE! This tutorial provides a very simple and quick introduction to the NetBeans IDE workflow by walking you through the creation of a simple
More informationAn evoting platform for QoE evaluation
An evoting platform for QoE evaluation José Luis Tornos, José Luis Salazar and Joan Josep Piles Communication Technologies Group University of Zaragoza {jltornos, jsalazar, jpiles}@unizar.es Abstract Electronic
More information