Page 31 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 31

The Witness-Voting System
                                                                                             23
                          bug, or a non-intrusive electromagnetic eavesdropping device that would record
                          all N keys for latter reuse without ever physically penetrating the platform). To
                          work, this method also depends on non-physical assumptions, including that the
                          election officials shall use independent judgment, cannot be coerced or intimi-
                          dated, are not bound by a conflicting trust commitment such as of a military,
                          political or religious nature, do not constitute a cabal, and have a minimum
                          level of honesty to resist collusion. It also assumes that the control system that
                          enforces the threshold of collusion cannot be corrupted. The quorum method
                          depends on a number of assumptions that in general are not revealed to the
                          voters and are likely not suitable for public elections. This practice also fails to
                          protect voter privacy under court or administrative order (when all keys and
                          secrets must be revealed).
                          Information-theoretic privacy: Exemplified by election systems in which
                          there is no reliance on cryptography in order to protect privacy (e.g., no re-
                          liance on public-key encryption). It defines a privacy strength that cannot be
                          broken by computation, even with unbounded time and resources. Information-
                          theoretic privacy, however, fails in the following examples: (a) parties share keys
                          in advance and use one-time pads, which is impractical and subject to collu-
                          sion (when keys are revealed); (b) parties share physically protected channels,
                          which fails against collusion where the channel is compromised (also without de-
                          tection); (c) parties share information (via secret-sharing techniques) and they
                          are assumed not to pool it together, which fails against collusion. Information-
                          theoretic privacy also cannot protect voter privacy in the case of a court order
                          that mandates revealing all keys and secrets used in the system.
                          Fail-safe privacy: Defined in [40] for election systems where voter privacy
                          cannot be compromised even if everything fails including software and hardware,
                          everyone colludes and there is a court order that mandates revealing all keys and
                          secrets used in the system. Current paper ballot voting systems can provide fail-
                          safe voter privacy. 30


                          7.2  Summary of Requirements
                          These Requirements are an extension of our previous work [40] and apply to
                          voting systems and rules of any type. In terms of systems architecture, our goal
                          is that the Requirements present a comprehensive consideration as to what is
                          to be done (functional), how well a voting system is to perform (performance)
                          and under what conditions it is to operate (environmental and non-functional).
                          Requirements are created and dictated by the goal of minimizing interference.

                          30
                            Fingerprints and DNA may be left on paper ballots by voters. If not prevented (e.g.,
                            by using a selection mask), this could be used to compromise privacy. However, the
                            cost and resources in mounting such an analysis has been a deterrent in practice.
                            Another way to compromise privacy is by matching paper fibers alongside a tear-off
                            boundary, for paper ballots that provide a “receipt” to voters; this would, however,
                            require the cooperation of the voter.
   26   27   28   29   30   31   32   33   34   35   36