Fostering Friendships - Enhancing Social Bonds in the Classroom
An Overview of E-Voting Systems and Vote Verification Techniques
1. An Overview of E-Voting Systems
and Vote Verification Techniques
Ali Fawzi Najm Al-Shammari
PhD Student-Free University of Bolzano-Italy
Lecturer at Faculty of Computer Science - Kerbala University
alifawzi@uokerbala.edu.iq
!
!
__________________________________________________________
!
1
3. Introduction
•
An election is a formal decision-making process by
which a population chooses an individual to hold
elected status.
•
•
Voting systems are the tools of any election.!
Voting systems must fulfil with a set of
requirements.
!
For instance :
!
!
__________________________________________________________
!
3
4. Voting Requirements
[Jeroen V. 2009, Tigran A. 2009]
Integrity (Accuracy)
Vote cast, and count as
intended.
Privacy
Anonymity
Receipt freeness
Usability
‒ Any voter without a previous
experience can use the
system.
Accessibility
‒ Any voter can vote
independently including
illiterate and disabled.
!
!
!
__________________________________________________________
!
4
5. Introduction (Motivation)
• E-Voting, the use of technology to facilitate one or
more elections processes, e.g.,:
Record, store, and count votes electronically.
Announcing result.
Voters’ authorization.
• Motivation ?
Speed up the precess!
More usable!
Less voter mistakes!
Supports illiterates and disabled voters
!
!
__________________________________________________________
!
5
6. Introduction (Types)
• In-person e-voting
Still a voter needs to visit a polling station .!
Using a dedicated machine, in a controlled
environment.!
• Online (Internet) e-voting
A voter can vote at home!
Using a personal device (PC, smart phone, ….)
!
!
__________________________________________________________
!
6
7. E-Voting Systems (In-person)
• Direct Recording Electronics (DRE)
Dedicated computer
Touch screen
Flash memory
Head set
!
!
__________________________________________________________
!
7
8. E-Voting Systems (In-person)
• Optical Scan Systems
Scanner device
Paper ballot
Flash memory
No assistive technology!
!
!
__________________________________________________________
!
8
9. E-Voting Systems (Online Voting)
• Online Voting
Personal Device
Voting Application
Cryptography
Can we trust a personal device?
Family voting?
!
!
!
__________________________________________________________
!
9
10. E-Voting Systems (Transparency)
•
Electronic systems are not
transparent enough for voter.
!
•
Therefore, their adoption has
been slow and criticized !!
!
!
__________________________________________________________
!
10
11. The Major Causes ...
•
Machines are subject to programming error,
equipment malfunction and malicious tampering!
•
Programs are proprietary information and are not
open to inspection!
•
Procedural and Environmental implications!
•
... also do we “trust officials” ?
!
!
__________________________________________________________
!
11
12. Verifiability
•
Support a voter, election official, and public entities
with an evidence about the integrity of election
results .
!
!
__________________________________________________________
!
12
13. Types of Verification
• Individual (Voter) verifiability
Supporting a voter with an evidence that his/her vote has been
captured, cast, and count as intended.
• Universal (Public) verifiability
Supporting the election officials, and public entities with an
evidence that the count votes are the same as intended by voters.
• Eligibility (Public) verifiability
Each count vote comes from single eligible voter.
!
!
__________________________________________________________
!
13
15. VVAATT [T. Selker]
(Voter Verified Audio Audit Transcript Trail)!
• Used with DRE systems!
• Vote verified over a voice message heard through a headset!
!
Verification voice stored in type as an evidence
• !
__________________________________________________________
!
15
16. VVPAT [R. Mercuri]
(Voter Verifiable Paper Audit Trail)!
- A voter verifies his/her vote
by reading printed paper trail. !
!
- A voter can’t take the printed
trail. !
!
-Trails stored in safe box
attached to the DRE and
used for auditing later.
!
!
__________________________________________________________
!
Printed Peper
Trail
16
17. VVAATT VVPAT (Pros Cons)
• Advantages
Easy to use.
Trails are physical evidence.
• Disadvantages
Manual auditing.
Does not allows the voter to verify the full life cycle of the his/
her vote (Not an End to End Verification method)
Votes order could be reviled.
!
! Voter language !!
__________________________________________________________
!
17
18. Electronic Trails [e.g., Pnyx.VM by Scytl]
Verification device
- Votes verified through an electronic verification device.
!
- Electronic copy of verified votes stored in the verification
!
!
device to be used for recounting.
__________________________________________________________
!
18
19. Pnyx.VM (Pros Cons)
• Advantages
Easy to use.
Automatic Auditing.
• Disadvantages
Does not support End to End verifiability.
!
!
__________________________________________________________
!
19
20. How to provides an End to End verifiability without
compromising privacy requirement ?
The magic of cryptography!
!
!
__________________________________________________________
!
20
21. VoteHere Votegrity [D. Chaum]
printer
Encrypted receipt
- Partial information about ballot encrypted in receipt and given
to voter for end-to-end verifications
!
!
__________________________________________________________
!
21
22. Scantegrity [D. Chaum] Pret a Voter [P. Ryan]
Optical scanner
Encrypted receipt
- Partial information about ballot encrypted in receipt and !
given to voter for end-to-end verifications
!
!
__________________________________________________________
!
22
23. Cryptography (Pros Cons)
• Advantages
Supports an End-to-End verification.
Hard to be compromised.
• Disadvantages
Not so usable.
What about long term privacy ?
!
!
__________________________________________________________
!
23
24. Problem
• Current
verification methods still not able to
cover all threats and challenges !!!
• Eligibility verifiability still weakly supported.
!
!
__________________________________________________________
!
24
25. Conclusion
• Any critical system could be compromised by:
A failure.
An attack (insider or outsider).
• Regular system provides receipts to any user to
verify the integrity of his/her data.
• In
E-Voting system it is not possible to provide
such receipts
Vote must be anonymous.
! A voter must not be able to approve to any one about how he/she
!
voted.
__________________________________________________________
!
25
26. Conclusion
• However,
Academic and Industrial
sectors provides some techniques that
balancing between
allowing vote verification, and
keeping the privacy and receipt freeness requirements.
!
!
__________________________________________________________
!
26
27. Thanks For Your Attention
!
!
Welcome to any possible collaboration
alifawzi@uokerbala.edu.iq
!
!
__________________________________________________________
!
27