E2E Verifiable Borda Count Voting System Without Tallying Authorities

E2E Verifiable Borda Count Voting System Without Tallying Authorities

E2E Verifiable Borda Count Voting System without Tallying Authorities Samiran Bag Muhammad Ajmal Azad Feng Hao University of Warwick University of Derby University of Warwick Coventry, United Kingdom Derby, United Kingdom Coventry, United Kingdom [email protected] [email protected] [email protected] ABSTRACT choose one candidate from a list (e.g., in “first past the post”), the An end-to-end verifiable (E2E) voting system enables candidates, Borda count system allows taking in more information from voters voters and observers to monitor the integrity of an election process about their preferences of all candidates. Hence, it tends to elect a and verify the results without relying on trusted systems. In this candidate who is broadly acceptable rather than simply the most 1 paper, we propose a DRE-based Borda count e-voting system called popular [23]. DRE-Borda. The proposed system is E2E verifiable without involv- In a traditional Borda count voting system, voters mark their ing any tallying authorities. Furthermore, it outputs only the total preferences of the candidates on a paper ballot. However, manual score a candidate gets without revealing any other information counting of the Borda count votes can prove tedious and error-prone such as the breakdown of scores with respect to different ranks. especially when there are many cast ballots and many candidates. This reduces the information leakage from the tallying result to Often, an electronic device is used to automate the process, e.g., the minimum, hence effectively preventing Italian attacks. When using a Direct Recording Electronic (DRE) voting machine to record the DRE machine is completely compromised, the integrity of the the voter’s choice directly, and compute the scores for all candidates tallying result is still preserved and what an adversary can learn electronically. Thus, tallying results are instantly available once from a compromised machine is strictly limited to the partial tally all voters have cast their votes. However, the use of an election at the time of compromise. machine introduces a number of security threats: e.g., the machine (or the software inside the machine) may be compromised to give KEYWORDS selected candidates certain advantages without the public knowing it. Borda count election, E-voting, Non-interactive zero knowledge To address the lack of integrity for a DRE-based voting system, proof, Direct-recording electronic voting machine, End-to-end veri- Chaum first proposed a seminal solution based on visual cryptogra- fiability. phy [11]. Chaum’s voting protocol allows voters to visually verify ACM Reference Format: their votes by overlaying two printed transparencies, each being Samiran Bag, Muhammad Ajmal Azad, and Feng Hao. 2019. E2E Verifiable an encrypted share of the vote. Obviously, the operation of physi- Borda Count Voting System without Tallying Authorities. In Proceedings cally aligning transparencies is not straightforward for most voters. of the 14th International Conference on Availability, Reliability and Security Nonetheless, Chaum’s solution highlights the important notion (ARES 2019) (ARES ’19), August 26–29, 2019, Canterbury, United Kingdom. of end-to-end (E2E) verifibility, which encompasses the following ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3339252.3339259 requirements: individual voters are able to verify their votes are cast 1 INTRODUCTION as intended, and recorded as cast, and any public observers (univer- sal verifiers) are able to verify that all votes are tallied as recorded. The Borda count is a ranked-choice electoral system, which has Following Chaum’s work [11], many other E2E verifiable voting been used in national assembly elections in Nauru and Slovenia, systems are proposed to improve Chaum’s scheme in various ways, and also in student union elections in several universities (e.g., e.g., MarkPledge [21], Prêt à Voter [22], Punchscan [14], Scant- Michigan, UCLA, Harvard) [10, 15, 23]. In a Borda count system, egrity [13], Scantegrity II [12], scratch & vote [4], STAR-Vote [6], each voter ranks the candidates in order. A candidate receives a Adder [20], and Helios [5]. These systems use either mix-net [11] score depending on its position in the ranking order. For example, or homomorphic encryption [3], but they all involve a set of trust- a candidate may get 1 point for being the last preference, 2 points worthy tallying authorities (TAs) to perform the decryption and for the second last preference and so on. The candidate with the tallying process in a publicly verifiable way. highest aggregated points wins. As compared to the more com- One major obstacle in deploying these E2E verifiable e-voting mon plurality voting method where voters are only permitted to systems in practice is finding and managing such a set of TAs. The TAs should be selected from different parties of conflicting interests, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed so they are unlikely to collude. A threshold control scheme should for profit or commercial advantage and that copies bear this notice and the full citation be applied to distribute the trust among the TAs. The threshold on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, should be sufficiently high such that collusion is difficult, butalso to post on servers or to redistribute to lists, requires prior specific permission and/or a sufficiently low such that the system is fault-tolerant (e.g.,a n/n fee. Request permissions from [email protected]. threshold control gives the highest resistance to collusion, but the ARES ’19, August 26–29, 2019, Canterbury, United Kingdom © 2019 Association for Computing Machinery. ACM ISBN 978-1-4503-7164-3/19/08...$15.00 1As an example, Donald Trump may be considered the most popular by votes in the https://doi.org/10.1145/3339252.3339259 2016 US presidential election, but he was not “broadly acceptable”. ARES ’19, August 26–29, 2019, Canterbury, United Kingdom Samiran Bag, Muhammad Ajmal Azad, and Feng Hao whole election data will fail to decrypt if one share is missing). and strictly limits the attacker to learn only the partial tally at the Furthermore, the TAs are assumed to manage their private key time of compromise. Our contributions are summarized below. shares securely and perform cryptographic operations competently. • We propose the first E2E verifiable Borda count voting sys- As reported in the real-world case of using Helios to elect the tem without any TAs. Our system is designed for DRE-based university president in Université catholique de Louvain (UCL), voting in a polling station environment. finding and managing TAs in practice proved to be “one particularly • We present security proofs to show the security and privacy difficult issue” [3]. guarantee of our proposed system, and detailed analysis of In 2014, Hao et al. proposed to address the above issue by re- the system complexity to show its practical feasibility. moving the need for TAs while retaining the E2E verifiability [17]. They called the new approach “self-enforcing e-voting” (SEEV) and 2 PRELIMINARIES proposed a concrete protocol called DRE-i. Their protocol removes the TAs by pre-computing the ciphertexts in such a way that multi- 2.1 Trust assumptions plying ciphertexts will cancel out random factors and hence allow We explain our trust assumptions according to the following re- anyone to verify the tally. Based on DRE-i, the authors implemented quirements. an E2E verifiable Internet voting system, which has been usedin • Registration We assume voter registration is done securely, campus elections including classroom voting and student prize and only eligible voters are registered with rights to vote. competitions [16]. • Authentication When in the polling station, we assume In 2016, Shahandashti and Hao proposed an alternative design of voters are properly authenticated with identifying docu- the SEEV system called DRE-ip [24]. The DRE-ip system provides ments (e.g., ID, passport). Normally, when voting is finished, the same E2E verifiability as DRE-i without requiring TAs, butin the polling station should make available a list of voters contrast to DRE-i that uses pre-computation, it encrypts ballots in who have cast their votes2. Any public observer will be able real-time. Because of the real-time computation strategy, DRE-ip is to count the number of voters and compare that against more suitable for polling station voting than DRE-i which requires the number of votes published on the public bulletin board secure storage of pre-computed ballots. The system removes the (which we will explain). The two numbers should match (for need for TAs by keeping an aggregated form of the random factors preventing ballot stuffing). in the memory, which will only be published in the end of the elec- • Anonymity We assume voting is anonymous. After being tion to enable public verification of the tallying integrity without authenticated in the polling station, each voter obtains a involving any TAs. The system provides strong privacy guarantee random credential, which could be a one-time password or that when the DRE is completely compromised, an attacker will a smartcard. This credential allows the voter to log onto the only be able to learn the partial tally at the time of compromise, DRE machine in a private voting booth and cast one vote, which is the minimum information leakage. but the machine does not know the voter’s real identity. Self-enforcing e-voting systems such as DRE-i [17] and DRE-ip • Integrity We assume the DRE machine may alter the voter’s [24] significantly simplify the election management by removing choice or change the tallying results.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us