Page 134 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 134

Rezende
                                 P.A.D.
                          126
                          convictions of electoral results’ correctness in the participation and experience of in-
                          dividual common voters, as something essential for the voter confidence which – we
                          believe – underlies the spirit of democracy.
                            From the technical  standpoint, these experts  may defend  the retention of some
                          material representation of individual votes by electronic systems for another simple
                          reason: if they are convinced that the scientific resources and technological tools
                          available to, or even possible for, computer security are insufficient to sustain trust in
                          the outcome of fully electronic secret ballots, at least to an extent consistent with the
                          spirit of democracy.
                            Among these experts we find living icons of Computer Science, such as Ronald
                          Rivest (one of the inventors of the pioneer RSA method for digital signature), David
                          Chaum (inventor of eCash  “digital cash“) and Bruce Schneier (cryptographer and
                          author of major best-sellers on computer security).
                            Their repute has led, for instance, at least one political scientist to argue why it is
                          much easier to protect financial electronic transactions against electronic fraud than to
                          tally a fully electronic ballot of secret votes with equivalent overall security [17].
                            Reliance on fully electronic mechanisms for voting and for election auditing pur-
                          poses yields more routes for plausible deniability to those who may wish to stealthily
                          interfere in the electoral result while controlling the underlying technology. Relying
                          solely on electronic  measures for auditability has  meant that any  new  measure de-
                          signed to close these routes end up opening their own.
                            As a contribution to this debate, we posit that the heart of the disconnect between
                          these two groups – formed by distinguished computer security experts and by election
                          officials or suppliers in favor of fully electronic voting systems – may stem from the
                          different way that each group, either by virtue of their craft or by gut feeling, under-
                          stands “security”:
                             •   [1st sense]: security from the standpoint of voters (and experts on their behalf)
                                 a) with rights to a secret ballot and to its correct tallying,
                                 b) against possible manipulations of the electoral process,
                                 c) by whoever in the electoral system,
                                 d) which should be readily detectable by voter oversight;
                             •   [2nd sense]: security from the standpoint of those running elections
                                 a) with rights to program or operate the electoral system,
                                 b) against detection by voter oversight,
                                 c) of whatever act imputable to ineptitude or bad faith,
                                 d) through which manipulations of the tallying is possible.


                          3   Risk and Modernity

                          The main difficulty we can point to, regarding the security of fully electronic voting
                          systems as we see it, is rooted in an inconsistency between two basic requirements.
                          The first of these requirements is vote secrecy, and the second is the requirement
                          for dematerialization of votes (if the voting system is to be fully electronic). The
                          inconsistency, explained in the next section, arises under real-world conditions, in
   129   130   131   132   133   134   135   136   137   138   139