750 likes | 991 Views
6. Esoteric Protocols secure elections and multi-party computation. Kim Hyoung-Shick. Contents. 1. Secure elections Introduction Protocols 2. Secure multiparty computation Introduction Examples 3. Conclusion. Contents. 1. Secure elections Introduction Protocols
E N D
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick
Contents • 1. Secure elections • Introduction • Protocols • 2. Secure multiparty computation • Introduction • Examples • 3. Conclusion
Contents • 1. Secure elections • Introduction • Protocols • 2. Secure multiparty computation • Introduction • Examples
Voting What is the requirements ?
Voting Secure Booth ?
Voting Fair judge ?
Voting Privacy ! Fairness ! We need two major requirements.
Traditional Voting Vs Electronic Voting • Privacy • Fairness • Efficiency
Problems with Electronic Voting • No physical audit trail • Who provides the system? • How are they audited? • High Tech: More dependencies • More ways to subvert the system • etc.
Requirements for Electronic Voting • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. • Everyone knows who voted and who didn’t.
Requirements for Electronic Voting • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. • Everyone knows who voted and who didn’t.
Requirements for Electronic Voting • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. • Everyone knows who voted and who didn’t.
Contents • 1. Secure elections • Introduction • Protocols • 2. Secure multiparty computation • Introduction • Examples
Protocols 1. Simplistic voting protocols #1 2. Simplistic voting protocols #2 3. Voting with blind signatures 4. Voting with two central facilities 5. Voting with ANDOS 6. Improved voting with ANDOS 7. Voting without a central facility
Idea of Simplistic Voting Protocol #1 secure booth = encryption
3. ECTF(V) Central Tabulating Facility Simplistic Voting Protocol #1 PCTF SCTF Voter Vi 1. Choose V 4. Tabulate V’s 5. Publish the result 2. Encrypt V into ECTF(V).
Unsatisfied Requirements • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. (By intercept attack) • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. • Everyone knows who voted and who didn’t.
Protocols 1. Simplistic voting protocols #1 2. Simplistic voting protocols #2 3. Voting with blind signatures 4. Voting with two central facilities 5. Voting with ANDOS 6. Improved voting with ANDOS 7. Voting without a central facility
Idea of Simplistic Voting Protocol #2 secure booth = encryption identification card = sign
4. ECTF(Si(V)) Central Tabulating Facility Simplistic Voting Protocol #2 PCTF Pi SCTF Si Voter Vi 5. Decrypt, verify, tabulate V’s 1. Choose V 2. Sign V into Si(V) 6. Publish the result 3. Encrypt Si(V) into ECTF(Si(V))
Unsatisfied Requirements • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. (CTF knows it.) • Everyone knows who voted and who didn’t.
Protocols 1. Simplistic voting protocols #1 2. Simplistic voting protocols #2 3. Voting with blind signatures 4. Voting with two central facilities 5. Voting with ANDOS 6. Improved voting with ANDOS 7. Voting without a central facility
노 Kim Problem with Signature
Idea of Voting with Blind Signature 노 accept
Idea of Voting with Blind Signature Be covered !
3. B(M) 5. SCTF(B(M)) Central Tabulating Facility Voting with Blind Signature PCTF Pi SCTF Si Voter Vi 4. Check if B(M) is valid 1. Generate M = (O1, … , On, IDr , i) 2. Blind M into B(M) 6. Choose SCTF(Oi) 7. Generate M’ = (SCTF(Oi), SCTF(IDr), SCTF(i))
8. M’ Central Tabulating Facility Voting with Blind Signature PCTF Pi SCTF Si B(M) Voter Vi 9. Verify, check ID duplication 10. Publish the result
Unsatisfied Requirements • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. (CTF knows it.) – it need to provide anonymous channel. • Everyone knows who voted and who didn’t.
Additional Some Problems • CTF can generate a large number of signed, valid votes and cheat by submitting those itself. • If voter discovers that the CTF changed his or her vote, he or she has no way to prove it.
Protocols 1. Simplistic voting protocols #1 2. Simplistic voting protocols #2 3. Voting with blind signatures 4. Voting with two central facilities 5. Voting with ANDOS 6. Improved voting with ANDOS 7. Voting without a central facility
Review of Traditional Voting 1. Check voter’s identification by checker. voter checker
Review of Traditional Voting 2. Count votes in the ballot boxes by counter. counter
Review of Traditional Voting There are two positions in the voting. counter checker
Central Legitimization Agency Central Tabulating Facility Idea of Voting with Two Central Facilities
1. Ask for VN 3. VNr Central Legitimization Agency Voting with Two Central Facilities PCLA Pi SCLA Si VN list Voter Vi 2. Maintain VN list for voters
4. VN list Central Legitimization Agency Central Tabulating Facility Voting with Two Central Facilities PCLA PCTF SCLA SCTF VN list
8. M Central Tabulating Facility Voting with Two Central Facilities PCTF Pi SCTF Si VNr VN list Voter Vi 9. Check if M is valid and maintain VN list 5. Choose IDr 6. Generate M = (V, IDr, VNr) 10. Publish the result 6. Choose SCTF(Oi) 7. Generate M’ = (SCTF(Oi), SCTF(IDr), SCTF(i))
Unsatisfied Requirements • Only authorized voters can vote. • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. (But, the collusion is possible.) • Everyone knows who voted and who didn’t.
Additional Some Problems • CLA can generate a large number of signed, valid votes and cheat by submitting those itself. – It solve that CLA publish a list of certified voters. • As stated above, the collusion is possible.
Protocols 1. Simplistic voting protocols #1 2. Simplistic voting protocols #2 3. Voting with blind signatures 4. Voting with two central facilities 5. Voting with ANDOS 6. Improved voting with ANDOS 7. Voting without a central facility
What is ANDOS (All-Or-Nothing Disclosure of Secrets) Sender Receiver - Sender doesn’t know that receiver has gained the one. - As soon as receiver has gained anyone, he can’t receive other messages.
1. Ask for VN 3. VNr by ANDOS Central Tabulating Facility Voting with ANDOS PCLA Pi SCLA Si VN list Voter Vi 2. Maintain VN list for voters
Unsatisfied Requirements • Only authorized voters can vote. – we solve it by blinded signagture • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. • Everyone knows who voted and who didn’t.
Protocols 1. Simplistic voting protocols #1 2. Simplistic voting protocols #2 3. Voting with blind signatures 4. Voting with two central facilities 5. Voting with ANDOS 6. Improved voting with ANDOS 7. Voting without a central facility
Idea of Improved Voting with ANDOS Voter is also checker for CTF
1. Join within T 3. IDr by using ANDOS Central Tabulating Facility Voting with Blind Signature PCTF Pi SCTF Si Voter Vi 2. Publish a list of participants
5. IDr, Ei(IDr, V) 7. IDr Si Central Tabulating Facility Voting with Blind Signature PCTF Pi SCTF Si IDr Voter Vi 6. Publish Ei(IDr, V) 8. Decrypt, publish the result. (For each candidate, the list of all Ei(IDr, V) that voted for a candidate)
9. IDr, Ei(IDr, V), Si Central Tabulating Facility Voting with Blind Signature PCTF Pi SCTF Si IDr or 9. IDr, Ei(IDr, V’), Si Voter Vi Within time T, voter can change the vote.
Central Tabulating Facility The Reason of the possibility for protest 6. Publish Ei(IDr, V) CTF should be examined for performing his duty by voter Vi
Unsatisfied Requirements • Only authorized voters can vote. – we solve it by blinded signagture • No one can vote more than once. • No one can duplicate anyone else’s vote. • No one can change anyone else’s vote without being discovered. • Every voter can make sure that his vote has been taken into account in the final tabulation. • No one can determine for whom anyone else voted. • Everyone knows who voted and who didn’t.