Building Reliable Voting Machine Software

Total Page:16

File Type:pdf, Size:1020Kb

Building Reliable Voting Machine Software Building Reliable Voting Machine Software Ka-Ping Yee Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-167 http://www.eecs.berkeley.edu/Pubs/TechRpts/2007/EECS-2007-167.html December 19, 2007 Copyright © 2007, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Acknowledgement I am grateful to many people who helped make this dissertation possible. My advisors: David Wagner, Marti Hearst. My committee members: Henry Brady, Joe Hellerstein. Advice: Steve Bellovin, Candy Lopez, Scott Luebking, Noel Runyan, Joseph Hall. Security review: Matt Bishop, Ian Goldberg, Tadayoshi Kohno, Mark Miller, Dan Sandler, Dan Wallach. Funding: National Science Foundation, through ACCURATE. Thanks also to Scott Kim, La Shana Porlaris, Lisa Friedman, and my parents. Building Reliable Voting Machine Software Ka-Ping Yee B. A. Sc. (University of Waterloo) 1998 A dissertation submitted to the Graduate Division of the University of California, Berkeley in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Committee in charge: Professor David Wagner, Co-chair Professor Marti Hearst, Co-chair Professor Henry Brady Professor Joseph Hellerstein Fall 2007 The dissertation of Ka-Ping Yee is approved. Professor David Wagner (Co-chair) Date Professor Marti Hearst (Co-chair) Date Professor Henry Brady Date Professor Joseph Hellerstein Date University of California, Berkeley Fall 2007 Building Reliable Voting Machine Software Copyright © 2007 Ka-Ping Yee Permission is granted to copy, distribute, and/or modify this document under the terms of the GNU Free Documentation License, version 1.2 or any later version published by the Free Software Foundation, with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the appendix entitled GNU Free Documentation License. Abstract Building Reliable Voting Machine Software Ka-Ping Yee Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Co-chair Professor Marti Hearst, Co-chair I examine the question of how to design election-related software, with particular attention to the threat of insider attacks, and propose the goal of simplifying the software in electronic voting machines. I apply a technique called prerendering to reduce the security-critical, voting-specific software by a factor of 10 to 100 while supporting similar or better usability and accessibility, compared to today’s voting machines. Smaller and simpler software generally contributes to easier verification and higher confidence. I demonstrate and validate the prerendering approach by presenting Pvote, a vote-entry program that allows a high degree of freedom in the design of the user interface and supports synchronized audio and video, touchscreen input, and input devices for people with disabilities. Despite all its capabilities, Pvote is just 460 lines of Python code; thus, it directly addresses the conflict between flexibility and reliability that underlies much of the current controversy over electronic voting. A security review of Pvote found no bugs in the Pvote code and yielded lessons on the practice of adversarial code review. The analysis and design methods I used, including the prerendering technique, are also applicable to other high-assurance software. Professor David Wagner Professor Marti Hearst 1 This dissertation is dedicated to those who work to run elections everywhere in the world: registrars, officers, pollworkers, clerks, judges, scrutineers, observers, and everyone else involved in the process. You carry out the mechanisms that make democracy work; this research is devoted to helping you make democracy work better. i Preface The democracy upon which our modern society is built ultimately depends on a system that collects and counts votes. For many voters in the United States and other countries, nearly every part of that system relies on computer software in some way. If you had to design that software, how would you do it? This dissertation offers an exploration of that question and a proposed answer: create the simplest possible voting machine software. I use a technique called prerendering to reduce the critical voting-specific software by a factor of 10 to 100 while supporting similar or better accessibility and usability, compared to today’s machines. Central to this dissertation is the story of Pvote, the program I developed to realize this goal. The first reason to simplify software is the threat of an insider attack. The challenge is to prevent not just inadvertent flaws, but flaws intentionally crafted by programmers who stand to gain from subverting their own software. The only way to meet this challenge is to require simpler software. The second reason is that much of the controversy over electronic voting stems from a conflict between flexibility and reliability. Computers offer the promise of broader and more effective access to voting, but computer programs are more complicated and fragile than hand-counted paper ballots. Simplifying the voting machine software mitigates this dilemma. The problem of electronic voting is illustrative of the challenges of building reliable software in general. In particular, I report on insights from the Pvote work about managing the complexity of high-assurance software and about reviewing software for correctness without assuming trust in its author. Both are relevant to the prevention of insider attacks, which are a thorny and long-standing problem in software security. ii This dissertation is intended for several audiences: • Election staff, policymakers, and activists: If you run elections or influence how elections are conducted, I hope to make you aware of the perils of complexity in software (Chapters 1 and 9), and to calibrate your tolerance for complexity in election software by demonstrating how much it can be simplified. I also hope to contribute to your understanding of the tradeoffs among various choices of voting equipment and verification methods (Chapter 3). • Engineers: If you build software, you may be able to achieve greater confidence in it using the analysis, design, and review strategies presented here (Chapters 2, 3, and 8). If you develop voting machines, you can apply the prerendering strategy to create more reliable software (Chapter 4), use ideas from Pvote’s design and implementation (Chapters 5, 6, and 7), or use the Pvote code as a basis for your own software (Appendices A and B). • Researchers: If you investigate software reliability or security, you may be interested in assurance trees (Chapter 2), a way of structuring assurance claims during software design, prerendering (Chapter 4) as a strategy for reducing the trusted code base of a system, or derivation maps (Chapter 9) for understanding sources of vulnerability to insiders and the effects of shifting complexity among components. The Pvote review experience (Chapter 8 and Appendix E) motivates research challenges in the design of programming languages, development environments, and reviewing tools to support adversarial code review. • Designers: If you practice visual design or interaction design, you may be interested to learn how prerendering (Chapter 4), the main software approach presented here, can offer you unprecedented freedom in designing electronic ballots and new opportunities for advancing democracy through the power of design. Preface iii Contributions This is a quick guide to the main contributions of this work and where to find them. 1. A set of correctness properties for voting software derived as an assurance tree (page 24). 2. An assurance chart comparing types of voting systems according to the verification mechanisms available to voters at each step of the voting process (page 56). 3. User interface prerendering, a technique for reducing the complexity of critical software components (page 57). 4. Pvote’s ballot definition file format, a platform-independent format for describing the ballot and the voting user interface in a prerendered user interface voting system (page 121). 5. The software design of Pvote, a vote-entry program with support for a wide range of ballot designs and voters with disabilities (page 127). 6. A set of desirable properties of programming languages to support adversarial code review (page 149). 7. Lessons learned from the Pvote security review, the first open adversarial code review of voting software designed for minimal complexity and high assurance (page 153). 8. Derivation mapping, a method of diagramming the provenance of a security-critical artifact to identify sources of vulnerability to insider attacks (page 161). 9. A security argument for the use of high-level programming languages in high-assurance software (page 173). 10. Proof by construction (the implementation of Pvote) that a fully featured user interface for voting can be implemented in 460 lines of Python (page 217). 11. A security analysis and a set of assurance arguments for Pvote, which are given in a separate document [92]. iv Acknowledgements I have been extremely lucky to have David Wagner and Marti Hearst as my advisors. They supervised and supported this work, and provided me with guidance and insight during my career as a graduate student. They removed obstacles and sought out opportunities for me. Their responsiveness and detailed feedback have been fantastic. I also thank Henry Brady and Joe Hellerstein, who served on my committee and went out of their way to review this dissertation on a short time frame. Steve Bellovin suggested the idea of prerendering, which sparked this work. Candy Lopez of the Contra Costa County Elections Department patiently showed me how real elections are run. Scott Luebking and Noel Runyan helped me understand the accessibility issues surrounding voting.
Recommended publications
  • NIST Voting Presentation
    Improving U.S. Voting Systems NIST VOTING Mary Brady Voting Program Manager NIST [email protected] Josh Franklin Lead, NIST Voting Security [email protected] ISPAB 10/25/2017 1 Improving U.S. Voting Systems Topics • VVSG 2.0 Development • VVSG Scope • VVSG Structure • VVSG: Principles and Guidelines • Requirements & Test Assertions • Cybersecurity and Elections 2 Improving U.S. Voting Systems VVSG 2.0 Development EAC Standards Board of TGDC Board Advisors NIST Director Voting Guidelines • Tap into as many experts as possible NIST PWG’s • Get continual feedback Improving U.S. Voting Systems Together…Making It Happen NIST NASED EAC FVAP IEEE Goals Military/Overseas Voters High-level, Election plain language Process principles Common Data Format Legal Requirements Common Accessibility Threads Requirements -> verified code Improving U.S. Voting Systems NIST-EAC Public Working Groups Election Groups • Developed election process models that served as the basis for use cases and the core functions • Pre-Election (103 members) • Election: (107 members) • Post-Election: (96 members) Constituency Groups • Conducted gap analyses and developed draft VVSG 2.0 Principles and Guidelines • U&A (105 members) • Cybersecurity (121 members) • Interoperability (158 members) • Testing (84 members) 5 Improving U.S. Voting Systems Election Models 6 Improving U.S. Voting Systems Reaching Consensus on VVSG Scope Election Election Process Use Case Core WGs Models Scenarios Functions Pre, • TGDC • Standards Election, • EAC/NIST Board • PWG Chairs • Board of and Post Advisors • NASED Improving U.S. Voting Systems A New VVSG Structure EAC NASED EAC VVSG NASED Input Roundtable / TGDC, SB, BoA Subgroup / Futures Group to EAC / NIST Public Adoption NIST Meetings 8 Improving U.S.
    [Show full text]
  • The New Jersey Voting-Machine Lawsuit and the AVC Advantage DRE Voting Machine
    The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine Andrew W. Appel∗ Maia Ginsburg Harri Hursti Brian W. Kernighan Princeton University Princeton University Princeton University Christopher D. Richards Gang Tan Penny Venetis Princeton University Lehigh University Rutgers School of Law – Newark Abstract As a result of a public-interest lawsuit, by Court order we were able to study, for one month, the hardware and source code of the Sequoia AVC Advantage direct-recording electronic voting machine, which is used throughout New Jersey (and Louisiana), and the Court has permitted us to publicly describe almost everything that we were able to learn. In short, these machines are vulnerable to a wide variety of attacks on the voting process. It would not be in the slightest difficult for a moderately determined group or individual to mount a vote-stealing attack that would be successful and undetectable. 1 Litigation and legislation in New Jersey In October 2004 a group of public-interest plaintiffs, represented by Professor Penny Venetis of the Rutgers Law School, sued the State of New Jersey (in NJ Superior Court) over the State’s use of direct-recording electronic (DRE) voting machines in New Jersey. By 2004, most of New Jersey’s counties had adopted the Sequoia AVC Advantage full-face DRE. Currently 18 out of New Jersey’s 21 counties use this DRE. The plaintiffs argued that the use of DRE voting machines is illegal and unconstitutional: illegal, because they violate New Jersey election laws requiring that all votes be counted accurately and that voting machines be thoroughly tested, accurate, and reliable; and unconstitutional, because they violate the New Jersey constitution’s requirement that all votes count.1 The plaintiffs argued that one cannot trust a paperless DRE machine to count the vote.
    [Show full text]
  • Auditing Technology for Electronic Voting Machines
    CALTECH/MIT VOTING TECHNOLOGY PROJECT A multi-disciplinary, collaborative project of the California Institute of Technology – Pasadena, California 91125 and the Massachusetts Institute of Technology – Cambridge, Massachusetts 02139 AUDITING TECHNOLOGY FOR ELECTRONIC VOTING MACHINES Sharon B. Cohen MIT Key words: DRE, voting machine security, electronic voting, electronic voting machines, auditing technology VTP WORKING PAPER #46 May 2005 Auditing Technology for Electronic Voting Machines by Sharon B. Cohen Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degrees of Bachelor of Science in Computer Science and Engineering and Master of Engineering in Electrical Engineering and Computer Science at the Massachusetts Institute of Technology May 19, 2005 Copyright 2005 Sharon B. Cohen. All rights reserved. The author hereby grants to M.I.T. permission to reproduce and distribute publicly paper and electronic copies of this thesis and to grant others the right to do so. Author_________________________________________________________________ Department of Electrical Engineering and Computer Science May 19, 2005 Certified by___________________________________________________________ Ted Selker Thesis Supervisor Accepted by____________________________________________________________ Arthur C. Smith Chairman, Department Committee on Graduate Theses Auditing Technology for Electronic Voting Machines by Sharon B. Cohen Submitted to the Department of Electrical Engineering
    [Show full text]
  • Carback, R.T.: Security Innovations In
    APPROVAL SHEET Title of Thesis: Security Innovations in the Punchscan Voting System Name of Candidate: Richard T. Carback III Master of Science, 2008 Thesis and Abstract Approved: Alan T. Sherman Associate Professor Department of Computer Science and Electrical Engineering Date Approved: April 18th, 2008 Curriculum Vitae Name: Richard T. Carback III. Permanent Address: 2819 Manoff Rd, Halethorpe, MD 21227. Degree and date to be conferred: Master of Science, August 2007. Date of Birth: March 27, 1983. Place of Birth: Baltimore, Maryland. Secondary Education: Chesapeake High School, Pasadena, Maryland, 2001. Collegiate institutions attended: University of Maryland Baltimore County, Master of Science, Computer Science, 2008. Bachelor of Science, Computer Science, 2005. Major: Computer Science. Minor: None. Professional publications: • David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y.A. Ryan, Emily Shen, and Alan T. Sherman. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. Submitted to USENIX EVT 2008. • Russell A. Fink, Alan T. Sherman, and Richard Carback. TPM Meets DRE: Reducing the Trust Base for Electronic Voting using Trusted Platform Modules. Submitted to USENIX EVT 2008. • David Chaum, Aleksander Essex, Richard Carback, Jeremy Clark, Stefan Popoveniuc, Alan T. Sherman, and Poorvi Vora. Scantegrity: End-to- end voter verifiable optical-scan voting. Accepted for publication in IEEE Security and Privacy, volume May/June, 2008. • Stefan Popoveniuc, Jeremy Clark, Richard Carback, and Aleksander Essex. Securing optical-scan voting. Presented at Dagstuhl. To be published in Towards Trustworthy Election Systems in the Lecture Notes in Computer Science series by Spinger-Verlag, date unknown.
    [Show full text]
  • An Implementation of Dual (Paper and Cryptographic) Voting System
    Tel Aviv University Raymond and Beverly Sackler Faculty of Exact Sciences The Blatavnik School of Computer Sciences An Implementation of Dual (Paper and Cryptograhic) Voting System Submitted as a partial fulfillment of the requirements towards the Master of Science degree by Niko Farhi The research work has been conducted under the supervision of Prof. Amnon Ta-Shma March 2013 Abstract This thesis reports on the design and implementation of a cryptographic voting system, named Wombat. The system is designed to retain the ”look and feel” of standard paper- based plurality voting, while enhancing security using methods from modern electronic voting literature. To achieve this, the system executes two voting processes in parallel: one is electronic and end-to-end verifiable, while the other is paper based and emulates more traditional processes (to which the voters are accustomed). Consistency between the two processes is enforced by means of a new specially-tailored paper ballot format. In addition, this work examines the practicality of the Wombat protocol through im- plementation and field testing in two student council elections with over 2000 voters and party premiership elections with almost 900 voters. During these field test the usabilty, performance and voter satisfaction was examined. Overall, voters trusted the system and found it comfortable to use. Parts of this work were presented in EVote2012. ii Acknowledgments I wish to thank my advisor, Prof. Amnon Ta-Shma for his patience with me. I also wish to thank Mr. Ben Riva for providing aid when it was needed. iii Contents Abstract ii Acknowledgments iii 1 Introduction 1 1.1 ThesisOutline................................
    [Show full text]
  • The Scantegrity Voting System and Its Use in the Takoma Park Elections
    The Scantegrity Voting System and its Use in the Takoma Park Elections David Chaum Richard T. Carback Jeremy Clark Aleksander Essex Travis Mayberry Stefan Popoveniuc Ronald L. Rivest Emily Shen Alan T. Sherman Poorvi L. Vora John Wittrock Filip Zagórski 1 Introduction The Scantegrity project began with a simple question: is it possible to design a voting system offering the strong security properties of cryptographic end-to-end (E2E) election verification with the intuitive look and feel of a paper optical-scan ballot? This chapter recounts a decade-long research effort toward answering this question, from the design of Scantegrity’s precursor Punchscan, all the way to the first governmental election run by an E2E voting system. The main focus of this chapter is on the Scantegrity II voting system (hereafter referred to as simply Scantegrity) and its use in the municipal elections of Takoma Park, MD in 2009 and 2011. To our knowledge, the Takoma Park election of 2009 was the first use of an E2E-verifiable voting system in an in-person secret-ballot governmental election anywhere in the world, as well as being the first governmental election held in the United States to run on open-source software. We also describe the Punchscan voting system and its use in the 2007 election of the the University of Ottawa Graduate Students Association/Association Étudiant(e)s Diplômé(e)s (GSAÉD), which, to our knowledge, is the first time an E2E voting system was used in a binding election.1 Additionally, this chapter describes the remote voting system Remotegrity and accessible Scantegrity variant Audiotegrity, and their use in the 2011 Takoma Park election.
    [Show full text]
  • Demtech Research Security Analysis of Scantegrity System
    DemTech Research Security Analysis of Scantegrity System DemTech Technical Report Series TR-2012-1 May 2012 Copyright c 2012, DemTech Research Project IT University of Copenhagen All rights reserved. Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. Copies may be obtained by contacting: DemTech Project IT University of Copenhagen Rued Langgaards Vej 7 DK-2300 Copenhagen S Denmark Telephone: +45 72 18 50 00 Telefax: +45 72 18 50 01 Web www.demtech.dk This work is supported in part by DemTech grant 10-092309 awarded by the Danish Council for Strategic Research, Programme Commission on Strategic Growth Technologies. Security Analysis of Scantegrity System Amir Rached Submitted in partial fulfillment for the degree of Bachelor of Science. Committee: • Professor Carsten Schurmann¨ • Professor Joseph Kiniry 1 Contents 1 Introduction 3 2 Scantegrity 3 2.1 Basic Idea . 3 2.2 Scantegrity System . 4 2.3 Scantegrity Back-end . 5 2.4 Voting Experience . 7 2.5 Security . 8 2.5.1 Integrity . 8 2.5.2 Privacy . 9 3 Implementation 9 4 Deployment 10 4.1 Election Setting . 10 4.1.1 Meeting 1 . 10 4.1.2 Meeting 2 . 11 4.1.3 Meeting 3 . 11 4.1.4 Meeting 4 . 11 4.2 Back-end Architecture . 11 5 Evaluation 15 5.1 Douglas Wikstroem Attacks . 15 5.1.1 The Duplicates Thread . 15 5.1.2 The Duplicates Thread and The Inconsistency of Opened Commitments with a Permutation Thread . 16 5.1.3 The Inconsistency of Unrevealed Commitments with a Permutation Thread 16 5.1.4 Universal Verfiability When Checking Is Performed at the End of the Mixing 17 5.2 Initial Automated Language-based Security Analysis .
    [Show full text]
  • Voting System Failures: a Database Solution
    B R E N N A N CENTER FOR JUSTICE voting system failures: a database solution Lawrence Norden Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to campaign finance reform, from racial justice in criminal law to presidential power in the fight against terrorism. A singular institution – part think tank, part public interest law firm, part advocacy group – the Brennan Center combines scholarship, legislative and legal advocacy, and communication to win meaningful, measurable change in the public sector. about the brennan center’s voting rights and elections project The Brennan Center promotes policies that protect rights, equal electoral access, and increased political participation on the national, state and local levels. The Voting Rights and Elections Project works to expend the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. The Help America Vote Act in 2002 required states to replace antiquated voting machines with new electronic voting systems, but jurisdictions had little guidance on how to evaluate new voting technology. The Center convened four panels of experts, who conducted the first comprehensive analyses of electronic voting systems.
    [Show full text]
  • SCV End to End Verifiable Internet Voting -- System Perspective
    SCV end to end voting over the Internet Mirosław Kutyłowski, Filip Zagórski Institute of Mathematics and Computer Science Faculty of Fundamental Problems of Technology Wrocław University of Technology Abstract. We present Scratch, Click & Vote remote voting scheme. The scheme is end-to-end verifiable and allows for voting over the Internet. It guarantees se­ curity against malicious hardware and software used by a voter; a voter’s com­ puter does not get any knowledge about the voter’s choice. Moreover, it can blindly change the voter’s ballot with a small probability only. As a side result, we present a modification of the ThreeBallot that eliminates Strauss’-like attacks on this scheme. Keywords: Internet voting, e-voting, E2E, verifiable voting scheme, ThreeBallot, Punchscan 1 Introduction There are two main scenarios of e-voting: advanced voting procedures at polling places and remote electronic voting. Polling station voting Recently it has became evident that badly designed e- voting machines can be extremely dangerous to a voting process [8,10,14]. For­ tunately, a number of end-to-end auditable voting systems (E2E) has been pre­ sented recently. Interestingly, some recent designs implement electronic voting without any electronic voting machines [3,6,5,4]. Moreover, for these schemes each voter gets a receipt, which may be used to check if the voter’s ballot has been included in the tally. It is also possible to verify correctness of the results. On the other hand, the receipt cannot be used even by the voter to prove how she voted. So they cannot help to sell or buy votes.
    [Show full text]
  • Engineering Practical End-To-End Verifiable Voting Systems
    ABSTRACT Title of Dissertation: Engineering Practical End-to-End Verifiable Voting Systems Richard T. Carback III, Doctor of Philosophy, 2010 Dissertationdirected by: Alan T. Sherman, Associate Professor Department of Computer Science and Electrical Engineering We designed, built, tested, and fielded a vote counting system called Scantegrity. Scan- tegrity is part of a new class of end-to-end (E2E) verifiable voting systems. E2E verifiable systems are designed to solve chain of custody problems in elections by providing a privacy-preserving receipt to each voter. The voter can use the receipt to check a public record and verify that his or her ballot is counted without revealing the selected candidate. The public record gives election officials the ability to provide a strong, universally-accessible audit of the results, enabling transparent, verifiable elections that maintain privacy expectations. E2E systems offer radical improvements to integrity and transparency of election systems, and the adoption of E2E systems in public-sector elections can improve outcome integrity. In our design, we carefully considered the balance between usability and security issues, and we discuss the changes we made to implement the system. We examined the implementation through the results of a practical test of Scantegrity in a mock election in April 2009, which evaluated the system’s performance and surveyed the election participants about their experience with the system. We describe a number of changes we made to the system as a result of this test. For example, Scantegrity required better printing technology and a tally reconciliation system. We evaluated the modified system a second time by fielding it in the Takoma Park, Maryland, November 2009 municipal election, where we were able to survey voters and observe events throughout election day.
    [Show full text]
  • An E-Voting System That Ensures Voter Confidentiality and Candidate Privacy
    Enhanced Name and Vote Separated E‐voting System: An E‐voting System That Ensures Voter Confidentiality and Candidate Privacy __________________________________________ ©2014 Wiley. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Citation: Haijun Pan, Edwin S.H. Hou, and Nirwan Ansari, “Enhanced Name and Vote Separated E‐voting System: An E‐voting System That Ensures Voter Confidentiality and Candidate Privacy,” Wiley Security and Communication Networks, DOI: 10.1002/sec.944, vol. 7, no. 12, pp. 2335– 2344, Dec. 2014. URL: http://onlinelibrary.wiley.com/doi/10.1002/sec.944/abstract E-NOTE: An E-voting System That Ensures Voter Confidentiality and Candidate Privacy Haijun Pan, Edwin Hou, and Nirwan Ansari Abstract—In this paper, we propose an improved E-voting system based on our previous work (Name and vOte separaTed E-voting system, NOTE). The proposed E-voting system, referred to as Enhanced NOTE (E-NOTE), is enhanced with a new protocol design and a watchdog hardware device to ensure voter confidentiality and voting accuracy.
    [Show full text]
  • Survey on End-To-End Verifiable Cryptographic Voting Systems
    International Journal of Computer Applications (0975 – 8887) Volume 100 – No.16, August 2014 Survey on End-to-End Verifiable Cryptographic Voting Systems Labeeb Ahmed Qubati Sherif Khattab Ibrahim Farag Computer Science Dept., Computer Science Dept., Computer Science Dept., Faculty Of Computer And Faculty Of Computer And Faculty Of Computer And Information, Cairo University, Information, Cairo University, Information, Cairo University, Egypt Egypt Egypt ABSTRACT system (whether the voting system achieves the whole Electronic voting refers to the using of computers or characteristics or a part of them). The electoral process passes computerized voting equipments to cast ballots in the election. in three basic stages, the first stage is the registration stage, The e-voting has been developed for more than 20 years. In when the preparation of electoral is done, the second stage is the electronic voting, there are three stages: the registration the voting stage when the voters cast their votes, and finally stage, the voting stage, and the tally stage. Verifiable the tallying stage when the votes are compiled and counted cryptographic voting systems use encryption technology to then announce the results. The e-voting system can be secure electorate’s votes and to avoid coerce them to vote for represent in two subsystems, the first one includes the any particular candidate or to buy their votes, and any another registration stage and the second one includes the other two threats. This research aims to obtain an electronic voting stages. system could be used easily in the third world countries. In There are many electronic voting systems classified in several this research ten of existing cryptography verifiable voting ways, for example, HAVA classification which voting systems have been studied, and especially focused on End-to- systems are classified into four categories one of the four End verifiable voting systems, which is considered as the categories is E2E cryptographic-based, which is consider as newest class of voting systems.
    [Show full text]