secure voting

65
School of Engineering and Applied Sciences Harvard University Voters, Computers, and Trust: Designing Verifiable Elections Stuart M. Shieber Ben Adida Greg Morrisett Center for Research on Computation and Society October 18, 2008

Upload: ben-adida

Post on 06-May-2015

3.928 views

Category:

Technology


2 download

DESCRIPTION

A short and sweet version of my voting talk for the Harvard College Fund meeting. The talk started with Stuart Shieber and ended with Greg Morrisett. I haven't included their slides here, as I'm not sure what license they'd like to use.

TRANSCRIPT

Page 1: Secure Voting

School of Engineering and Applied SciencesHarvard University

Voters, Computers, and Trust: Designing Verifiable Elections

Stuart M. ShieberBen Adida

Greg MorrisettCenter for Research on Computation and Society

October 18, 2008

Page 2: Secure Voting

Secure Voting

Page 3: Secure Voting

• Voting is particularly challenging:requires secrecy and public auditability.

• Computer science enablesqualitatively novel solutions.

• Cryptography can reconcileseemingly contradictory requirements.

Page 4: Secure Voting
Page 5: Secure Voting

"That's for me and a button to know."

Joe, the plumber.

Page 6: Secure Voting

6

Page 7: Secure Voting

6

Page 8: Secure Voting

6

Page 9: Secure Voting

6

Page 10: Secure Voting

6

Page 11: Secure Voting

6

Page 12: Secure Voting

6

Page 13: Secure Voting

7

Page 14: Secure Voting

7

Page 15: Secure Voting

“When I finally sawthe results of our tests,

I thought I was going to throw up.”

Sec. of State, Ohio, last week.

Page 16: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 17: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 18: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 19: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 20: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 21: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 22: Secure Voting

Fashionable Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/9

Page 23: Secure Voting

Fashionable Voting

10

Page 24: Secure Voting

Voting is a fundamentally difficult problem.

11

Page 25: Secure Voting

12

Page 26: Secure Voting

12

14

12

Page 27: Secure Voting

12

1 person, 1 vote

14

12

Page 28: Secure Voting

Enforced Privacyto ensure each voter

votes in his/herown interest

13

Page 30: Secure Voting

http://www.cs.uiowa.edu/~jones/voting/pictures/

1892 - Australian Ballot

15

Page 31: Secure Voting

The Ballot Handoff

Alice the Voter

16

McCain

Page 32: Secure Voting

The Ballot Handoff

Alice the Voter

16

McCain

Page 33: Secure Voting

The Ballot Handoff

Alice the Voter

16

McCain

Page 34: Secure Voting

The Ballot Handoff

Alice the Voter

16

McCain

Page 35: Secure Voting

The Ballot Handoff

Alice the Voter

16

McCain

ObamaObamaObama

McCainMcCain

McCain

Page 36: Secure Voting

The Ballot Handoff

Alice the Voter

16

McCain

ObamaObamaObama

McCainMcCain

Black Box

McCain

Page 37: Secure Voting
Page 38: Secure Voting
Page 39: Secure Voting

Chain of Custody

19

Page 40: Secure Voting

Chain of Custody

Vendor

/*

* source

* code

*/

if (...

1

19

Page 41: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

19

Page 42: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

19

Page 43: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

4

Alice

19

Page 44: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

4

Alice

19

Page 45: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

Ballot Box Collection

5

4

Alice

19

Page 46: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

Ballot Box Collection

5

Results

.....6

4

Alice

19

Page 47: Secure Voting

Chain of Custody

VotingMachine

2

Vendor

/*

* source

* code

*/

if (...

1

Polling Location

3

Ballot Box Collection

5

Results

.....6

4

Alice

Black Box19

Page 48: Secure Voting

Computers have only obscured the process.

20

Page 49: Secure Voting

Computers have only obscured the process.

20

What aboutcomputer science?

Page 50: Secure Voting

Cryptographysolving problems that initially

appear to have conflicting requirements.

21

Page 51: Secure Voting

Public-Key Encryption

22

Customer

Page 52: Secure Voting

Public-Key Encryption

22

Customer

public key

Page 53: Secure Voting

Public-Key Encryption

22

Customer

public key

enc(cc number)

Page 54: Secure Voting

Bulletin Board

Public Ballots

Bob:McCain

Carol:Obama

23

Page 55: Secure Voting

Bulletin Board

Public Ballots

Bob:McCain

Carol:Obama

Alice

23

Page 56: Secure Voting

Bulletin Board

Public Ballots

Alice:Obama

Bob:McCain

Carol:Obama

Alice

23

Page 57: Secure Voting

Bulletin Board

Public Ballots

Alice:Obama

Bob:McCain

Carol:Obama

Tally

Obama....2McCain....1

Alice

23

Page 58: Secure Voting

Encrypted Public BallotsBulletin Board

Alice:Rice

Bob:Clinton

Carol:Rice

Tally

Obama....2McCain....1

Alice

24

Page 59: Secure Voting

Encrypted Public BallotsBulletin Board

Alice:Rice

Bob:Clinton

Carol:Rice

Tally

Obama....2McCain....1

Alice

Alice verifies her vote

24

Page 60: Secure Voting

Encrypted Public BallotsBulletin Board

Alice:Rice

Bob:Clinton

Carol:Rice

Tally

Obama....2McCain....1

Alice

Alice verifies her vote Everyone verifies the tally

24

Page 61: Secure Voting

How can we verify operations on

encrypted data?

Mathematical Proofs.

25

Page 62: Secure Voting

Zero-Knowledge Proof

Vote For:

Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

26

Page 63: Secure Voting

Zero-Knowledge Proof

Vote For:

Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

26

Page 64: Secure Voting

Zero-Knowledge Proof

This last envelope likely contains “Obama”

Vote For:

Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

26

Page 65: Secure Voting

Zero-Knowledge Proof

Open envelopes don’t proveanything after the fact.

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For: Obama

President:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MousePresident:

Mickey MouseVote For:

Paul

27

McCain