1 / 18

Towards Open Vote verification Method in E-Voting

Sec Vote 2012. Towards Open Vote verification Method in E-Voting. 17’th July2012. Ali Fawzi Najm Al- Shammari. E-voting Technologies. DRE (Direct Recording Electronics). Internet Voting. Optical Scan. Sec Vote 2012 Summer School , 16-20 July, 2012,  Schloss Dagstuhl , Germany.

kaia
Télécharger la présentation

Towards Open Vote verification Method in E-Voting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sec Vote 2012 Towards Open Vote verification Method in E-Voting 17’th July2012 Ali FawziNajm Al-Shammari

  2. E-voting Technologies DRE (Direct Recording Electronics) Internet Voting Optical Scan Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  3. E-Voting • Some of the advantages include: • Speeding up vote casting and tallying • Assisting illiterate and disabled to cast vote independently • Reducing voter mistakes (e.g., over- or under voting) Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  4. Vote Verification • E-voting adoption still slow and criticized !! people need to trust the system. • Vote verification is a way to address this issue. • Validate vote during and/or after casting • Support an evidence to election participating entities Vote has been processed as intended Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  5. Vote Verification Techniques (in polling place) • Polling Place Verification • VVAATT (Voter Verified Audio Audit Transcript Trail)[T. Selker] • VVPAT (Voter Verifiable Paper Audit Trail)[R. Mercuri] • Pynx.VM [Scytle] • End-to-End Verification • Votegrity[D. Chaum] • Prêt à Voter [P. Ryan] Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  6. Open Issues • Public verifiability is weakly supported. • No Common Standard for Verification. • E.g., vendor lock-in • Some of them, ‘Still’ may Exposed for Invasion • Weak in resisting different levels of attacks. Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  7. Problem Statement • How to design an open verification methodology for vote verification for specific class of e-voting technology, with the goal of achieving: • Standardization. • Independent verification by Third party. ? We select DRE… Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  8. DRE System Our approach… Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  9. Approach AFTER CLOSING POLLING PLACE! Select Voter Feed back Cast VM E-Voting Machine Open Vote Verification Protocol Report Report Election Officials Public Observers Compare Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  10. What public needs ? XML Ballot, XML Election Voting Software XML Ballot Verification Software XML Ballot XML Election E-Voting Machine VM Open Verification Protocol Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  11. What is the contents of XMLs ? • XML Elections • Election Name and Date • Precincts Names and locations • DRE Serials • XML Ballot • Contests and Related Candidates • Referendum Options The structure of XML Election and Ballot File described by standard EML (Election Markup Language) Schemas Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  12. Election Markup Language (EML) • EML [OASIS] • XML-based standard to support end to end management of election processes • Support structured interchange of data among hardware, software, and service providers Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  13. Possible Contributions • Standardization gives the possibility for different firms to produce verification components • To avoid putting trust on a single vendor producer of voting components. • Standardization , Independent Verification , Public Verifiability Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  14. Possible Contributions • Independent verification can facilitate attacks detection and feedback mechanism • Verify system against malicious actions and system fail Standardization , Independent Verification , Public Verifiability Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  15. Possible Contributions • Enhancing transparency through public verifiability • Improve public verifiability against (insider) attacks (e.g., electoral staffs) • Standardization , Independent Verification , Public Verifiability Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  16. Future Work • Building Prototype • Using EVM2003 Open Source DRE (Python) • Build a VM compatible to work with EVM2003 • Run virtual election process • Analyze the prototype Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

  17. Thank You for Your Attention

  18. Approach Connect DRE, VM Election name, Date, Precinct Name and DRE Serial • - Send voter Selection to VM • - Voter Verify Selection • Voter Cast • Copy of vote stored in VM • Public get VM report (only Report) • DRE and VM Reports verified Sec Vote 2012 Summer School , 16-20 July, 2012, SchlossDagstuhl, Germany.

More Related