21
The Current State The Current State of Cryptographic of Cryptographic Election Protocols Election Protocols Josh Benaloh Microsoft Research

The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

Page 1: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Current StateThe Current Stateof Cryptographicof Cryptographic

Election ProtocolsElection Protocols

Josh BenalohMicrosoft Research

Page 2: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

So, you want to hold an election …

Page 3: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Fundamental Decision

You have essentially two paradigms to choose from …

• Anonymized Ballots

• Ballotless Tallying

Page 4: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Anonymized Ballots

Page 5: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Ballotless Tallying

Page 6: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

A Fundamental Trade-Off

• Ballots simplify write-ins and other “non-standard” options.

• Non-standard options can compromise privacy.

Page 7: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Mix-Net Paradigm

Chaum (1981) …

Page 8: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Mix-Net Paradigm

Page 9: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Mix-Net Paradigm

MIX

Vote

Vote

Vote

Vote

Page 10: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Mix-Net Paradigm

MIX

Vote

Vote

Vote

Vote

Page 11: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Mix-Net Paradigm

MIX

Vote

Vote

Vote

Vote

MIX

Page 12: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Homomorphic Paradigm

Benaloh (Cohen), Fischer (1985) …

Page 13: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Homomorphic Paradigm

Tally

Page 14: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

The Homomorphic Paradigm

Tally

Page 15: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Some Principles of Election Protocols

• Privacy

• Verifiability

• Robustness

• Coercibility

Page 16: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Privacy

• Only one voter?

• A unanimous tally?

• Unanimous less one?

• Copy cats?

• Free-form ballots?

Page 17: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Verifiability

• By single trusted party?

• By trusted committee?

• By each voter?

• By observers?

Page 18: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Robustness

• Against faulty/malicious voter?

• Against faulty/malicious trustee?

• At what cost to privacy?

Page 19: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Coercibility

• Before the vote?

• During the vote?

• After the vote?

• By trustee, voter, or observer?

• Free-form ballots?

Page 20: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

Some of the Authors

• Mix-Net: Chaum, Fujioka, Okamoto, Ohta, Pfitzmann, Waidner, Park, Itoh, Kurosawa, Michels, Horster, Sako, Kilian, Abe, Hirt, Jakobsson, Juels, Rivest, Furukawa, Neff, Golle, Zhong, Boneh

• Homomorphic: Benaloh, Fischer, Yung, Tuinstra, Sako, Kilian, Franklin, Cramer, Gennaro, Schoenmakers, Hirt, Kiayias

Page 21: The Current State of Cryptographic Election Protocols Josh Benaloh Microsoft Research

And the winner is …

The new robust mix-net protocols are practical and offer the most flexibility.

Much recent work has concentrated on efficiency improvements.

Issues remain concerning receipts and coercion.

Practical concerns focus on authentication and system integrity.