Re: smartcards, electronic ballots

2001-02-06 Thread Dan Geer


This would seem relevant ...

http://dailynews.yahoo.com/h/nm/20010206/ts/voting_systems_dc_1.html

Tuesday February 6 12:23 PM ET Study: Old Voting Systems May Work Best

By Deborah Zabarenko

WASHINGTON (Reuters) - Looking back at Florida's election mess,
scientists say the old ways of casting a vote may work best: paper
ballots and lever machines give more accurate counts than punch cards
or electronic devices.

Another key message in a study of U.S. voting technology, released late
on Monday, seems to be that the machines are not always the problem.

``We believe that human factors drive much of the 'error' in voting,''
scientists from the California Institute of Technology and the
Massachusetts Institute of Technology (news - web sites) said in a Feb.
1 report to a task force that is studying voting problems in Florida.

Florida was the final battleground state in the hotly contested 2000
presidential race, with the outcome ultimately decided by the U.S.
Supreme Court (news - web sites) more than a month after the Nov. 7
Election Day.

There were questions about voting equipment that may have hindered the
accurate counting of thousands of Florida votes, notably Palm Beach
County's controversial ``butterfly ballot,'' a two-column punch card
ballot that confused many voters.

Without mentioning the ``butterfly ballot'' specifically in this
preliminary report, the scientists wrote, ``Some technologies seem to
be particularly prone to over-voting (voting for more than one
candidate for a single office), such as the punch card systems
implemented in Florida in the 2000 election.''

Wide Range Of Equipment

Part of the problem is the wide range of voting equipment used across
the United States, starting with the simple paper ballots that were
common in much of the country in the 19th century and ending with the
direct-recording electronic devices (DREs) that were introduced in some
areas in 2000.

In between are punch card ballots, lever machines -- in which voters
enter a booth and flick switches by their preferred candidates, then
finally record their votes by pulling a large lever -- and optically
scanned ballots, where voters use pencils to fill in circles beside the
candidates they choose.

Examining data on election returns and machines from about two-thirds
of all U.S. counties over four presidential elections starting in 1988,
the scientists found that manually counted paper ballots ``have the
lowest average incidence of spoiled, uncounted and unmarked ballots.''

Lever machines and optically scanned ballots were most accurate after
paper ballots, the report said, while punch card methods and DREs,
which look and operate a bit like automatic teller machines, had
``significantly'' higher error rates.

The difference in reliability between the best and worst systems was
1.5 percent, the report said.

Part of the difficulty may lie in voters' unfamiliarity with new
technology, said the group of social scientists that included experts
on computers, politics and economics.

``We don't want to give the impression that electronic systems are
necessarily inaccurate, but there is much room for improvement,'' the
California institute's Thomas Palfrey said in a statement.




Re: smartcards, electronic ballots

2001-02-06 Thread R. Hirschfeld

To pick nits, this is not completely accurate.  What is at odds with
non-coercibility is the ability to demonstrate to a third party how
one voted.  But there are techniques that allow a voter to verify that
his/her vote was counted correctly without being able to prove this to
others.  (Not that these are necessarily practical for a real-world
voting system.)

> Date: Sun, 04 Feb 2001 17:49:02 -0500
> From: Dan Geer <[EMAIL PROTECTED]>
> 
> 
> 
> As seems universally the case in security design, there must
> be ugly tradeoffs.  In particular (and without quoting acres
> of prior material), the proposed requirements for verifiability
> and non-coercibility are at odds and one must yield to the
> other.  Paper systems make this tradeoff by, on the one hand,
> the polling booth (non-coercibility once within) and, on the
> other hand, the supervision of the counting process by opponents
> (verifiability by proxy), at a cost of zero technology.  Bettering
> this in the real world is challenging.
> 
> --dan
> 
> ==
> as used here
> 
> verfiability
>   -- voter may verify that his vote counted as he intended it to count
> non-coercibility
>   -- voter cannot be compelled to show how he voted, during or after
> 
> proposition:
>  If the voter can verify, then he can be coerced to do so.
> contrapositive:
>  If voter cannot be coerced, then he cannot verify.
> 
> ==
> 
> 
> 




Re: smartcards, electronic ballots

2001-02-05 Thread Donald E. Eastlake 3rd


Why unfair?  The rules are published and people get to choose when
they vote.  Cambridge is the home of Harvard and other institutions of
higher education, so the populace is certainly not all peons.  I
believe there have been legal challenges to the system before which
failed.

The system is used for electing the city governing body.  As I
understand it, usuing the usual definition of a quota of (V/n+1)+1
votes out of V to elect to one of n seats, among other things the
first quota of ballots cast for someone elected are considered
exhausted and additional later ballots for that candidate are
distributed to their 2nd or lower preference.  To get the same effect
with order independence requires doing at least fixed point fractional
arithmetic if not floating point and is a lot more complex, although
apparently such complexities are performed routinely in preferential
elections in Australia.

Donald

(Not at lot to do with cryptography in this message, is there?)

From:  Ed Gerck <[EMAIL PROTECTED]>
Message-ID:  <[EMAIL PROTECTED]>
Date:  Sun, 04 Feb 2001 21:23:56 -0800
To:  "Donald E. Eastlake 3rd" <[EMAIL PROTECTED]>
CC:  [EMAIL PROTECTED]
References:  <[EMAIL PROTECTED]>

>"Donald E. Eastlake 3rd" wrote:
>
>> In Cambridge, Massachusetts, a preferential voting system is used
>> which is voting order depenent.  This requires that all ballots be
>> numbered so that they can be processed in the same order on a recount
>> or else different results could occur because of the change in order.
>
>Even if this is used for local elections, it looks like an unfair voting
>system. Simply by delaying some voters, the results would vary.
>Further, election results should not depend on who votes first, or last,
>because not all can vote first -- or last.
>
>Moreover, I think the  Supreme Court would find this system at odds with
>equal protection, don't you think so?
>
>Cheers,
>
>Ed Gerck




Re: smartcards, electronic ballots

2001-02-04 Thread William Allen Simpson

-BEGIN PGP SIGNED MESSAGE-

David Honig wrote:
> From "Ballot Proposal" version 1.3
> 
> 10 B DISPLAY
> (5) Election software shall print the selected choices on a fixed
> visible medium (such as paper), and shall require the voter to
> affirm those choices prior to electronic registration of the
> completed ballot.
> 
> I took this to mean that "what the machine thinks the voter chose
> is printed on paper" (for feedback/trust reasons).   Am I totally off?
> 
That's correct.  All the considered systems require some permanent 
audit record of the ballots.  This draft requires that the voter 
approve the record.  Thus, the printed record is primary, since the 
voter actually sees it and approves it.  Any electronic fudging can be 
detected and eliminated.

But, nobody is suggesting that the voter takes home the paper.  On the 
contrary, designs mentioned in meetings have the paper behind glass, 
not even touchable by voters.


> I wasn't clear on the architecture you have in mind ---I eventually
> figured out that you're requiring an online system with local and
> central real time reporting (mirroring) of votes.
> 
The Internet is big in legislators' eyes these days.  The network 
connection to a central (state) system is really the main motivation, 
as it allows the eRate funds to be used to run elections. 

Also, central state servers are needed to allow overseas electronic 
voting.  Too many trust relationships to have each base/embassy try 
to interact with every city or precinct.

And the mirroring keeps the locals from fudging the ballot counts.

Basically, I was asked, "Can the Internet be used to carry the votes, 
while still remaining secret?"  My answer is, "Yes, we already have 
SSL/TLS for confidentiality."  "What about ensuring votes only come 
from authorized places?"  "Easy, issue credentials for each machine, 
and use digital signatures on the ballots."  Etc, etc.

I've found a lot of support for open source software, because the 
politicians don't trust vendors or clerks.  They want lots of review. 
Especially with machines programmed by clerks.  And especially with all 
the campaign money that came in this cycle from so-called high-tech 
firms.  A compromised vendor would be a real problem for one party or 
another


> (Other architectures include standalone or LAN-only machines acting only as
> better voting-acquisition-machines; or a pure central server scheme like
> home internet voting.)
> 
There have been a lot of problems with stand-alone machines.  For 
example, in Florida, the recounts were supposed to actually re-run 
the ballots.  Instead, many places just looked at the counters without 
doing any real counting.  Also, elsewhere, machines have been found to 
be mis-programmed.  Etc, etc.

Home internet voting has a lot of problems, too, and is not being 
considered.  Just incremental improvements on the existing polling 
places and absentee ballots.  As you say, better vote acquisition -- 
evolution, not revolution.

The other thing is cost, cost, cost

Anyway, I've basically been answering a lot of questions for free, 
just as most of you are doing.  Admittedly, I've been given access to 
some reports and internal committee documents, but mostly I'm just 
trying to help them add security language.

I really think we've gone pretty far afield for this list.  Just send
messages to me privately, and I'll reply as I have time and interest.  
Thanks again.

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.1

iQCVAwUBOn4xmtm/qMj6R+sxAQElswQAwoZh8ZJ1sJFeQvpagdh2hJijtRNIONzD
Pae1EeCndFJwFfNHQFR87tOoNMNHCw+0Hf/IgUnYNrJVTr4WP8UJ1DAqdKS6Fw19
oLZ05hsaLvLgSwcGoR8WTkcr2emlkRzQ3vczGViPjlbNVPSptklN9nopQxFKe8HO
pGV9vquALz4=
=lZRn
-END PGP SIGNATURE-




Re: smartcards, electronic ballots

2001-02-04 Thread Donald E. Eastlake 3rd


From:  Ed Gerck <[EMAIL PROTECTED]>
Message-ID:  <[EMAIL PROTECTED]>
Date:  Sun, 04 Feb 2001 11:43:19 -0800
To:  David Honig <[EMAIL PROTECTED]>
Cc:  William Allen Simpson <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
"John R. Levine" <[EMAIL PROTECTED]>, Ed Gerck <[EMAIL PROTECTED]>
References:  <[EMAIL PROTECTED]> 
<[EMAIL PROTECTED]>

>.>...
>> The voting apparatus may keep a serial record of each vote, in order, for
>> auditing purposes.
>
>No, it MUST not.  See the FEC standards on voting. The FEC standards also
>demand "storage alocation scrambling" in order to avoid even a serial order
>of storage.

In Cambridge, Massachusetts, a preferential voting system is used
which is voting order depenent.  This requires that all ballots be
numbered so that can be processed in the same order on a recount or
else different results could occur because of the change in order.

>.>...



Re: smartcards, electronic ballots

2001-02-04 Thread David Honig

At 05:51 PM 2/4/01 -0500, William Allen Simpson wrote:
>-BEGIN PGP SIGNED MESSAGE-
>
>David Honig wrote:
>> 
>> If you give people a paper receipt with their votes on it
>> (as WAS's scheme mentions) then their votes can be bought or blackmailed.
>
>I'm unaware of how that interpretation might have arisen?  I don't see 
>anything in the proposed text that calls for a receipt to be given to 
>any voter, let alone a copy of their votes?

>From "Ballot Proposal" version 1.3

10 B DISPLAY
(5) Election software shall print the selected choices on a fixed
visible medium (such as paper), and shall require the voter to
affirm those choices prior to electronic registration of the
completed ballot.

I took this to mean that "what the machine thinks the voter chose
is printed on paper" (for feedback/trust reasons).   Am I totally off?

I wasn't clear on the architecture you have in mind ---I eventually
figured out that you're requiring an online system with local and
central real time reporting (mirroring) of votes.  

(Other architectures include standalone or LAN-only machines acting only as
better voting-acquisition-machines; or a pure central server scheme like
home internet voting.)




...
"What company did you say you were from, Mr. Hewlett?"
---Walt Disney to Bill Hewlett eetimes 22.01.01 p 32

 






  








Re: smartcards, electronic ballots

2001-02-04 Thread Ed Gerck



William Allen Simpson wrote:

> -BEGIN PGP SIGNED MESSAGE-
>
> I'm sorry for the second message, but I could not let the egregious
> error pass uncorrected:

:-) egregious ...

> Ed Gerck wrote:
> > The law does not allow it, and for good reasons as you mention.
> >...
> > > The voting apparatus may keep a serial record of each vote, in order, for
> > > auditing purposes.
> >
> > No, it MUST not.  See the FEC standards on voting. The FEC standards also
> > demand "storage alocation scrambling" in order to avoid even a serial order
> > of storage.
> >
> > > This is also mentioned in WAS's legislative text.
> >
> > which is a miconception, albeit a common one
> >
> Mr Gerck would do well to precisely specify the "law" which does not
> allow this?

California Election Code, for example.  In the US, there is NO federal jurisdiction on
election code -- as it became clear to Joe Doe after Florida. Pls also read about it in
Eva Waskell's article in The Bell, page 7, November 2000 issue, and also in Jim Hurd's
article in The Bell,page 6, July 2000 issue (both issues available at www.thebell.net 
in
the archives section),

> Mr Gerck would also do well to specify which FEC "standards" have the
> force and effect of law?

None -- and I never said so.  They are voluntary standards, but 40+ states have
decided to follow them and incorporate them in their laws.

> As to the matter of "law", the Congress is granted the power to set
> standards for its own election (Const Article I, Sections 4 and 5).
> The FEC isn't mentioned.

Indeed, this is what Article I, Section 4 says:  “The times, places, and manner of 
holding elections
for Senators and Representatives shall be prescribed in each State by the Legislature 
thereof;
but Congress may at any time by law make or alter such Regulations, except as to the 
Places
of chusing Senators.”

Thus, each individual state has exercised its right to administer elections in a 
manner reflecting
that state’s political, social and cultural make-up.  Although the Constitution 
clearly gives
Congress the authority to make or alter such state regulations, Congress has been very 
reluctant
to do so. However, Congress has intervened in state election procedures when, for 
example, they
gave women the right to vote and when they passed the Voting Rights Act. Nonetheless, 
states’
rights have taken precedence when it comes to conducting elections.

(sections above by Eva Waskell, ibid.)

> But the FEC proposed standards don't even consider networks, database
> replication with offsite storage, and as mentioned earlier, cryptographic security.

read the new drafts, already past first public meetings.  Read also the state 
documents.

Cheers,

Ed Gerck





Re: smartcards, electronic ballots

2001-02-04 Thread William Allen Simpson

-BEGIN PGP SIGNED MESSAGE-

I'm sorry for the second message, but I could not let the egregious 
error pass uncorrected:

Ed Gerck wrote:
> The law does not allow it, and for good reasons as you mention. 
>...
> > The voting apparatus may keep a serial record of each vote, in order, for
> > auditing purposes.
> 
> No, it MUST not.  See the FEC standards on voting. The FEC standards also
> demand "storage alocation scrambling" in order to avoid even a serial order
> of storage.
> 
> > This is also mentioned in WAS's legislative text.
> 
> which is a miconception, albeit a common one
> 
Mr Gerck would do well to precisely specify the "law" which does not 
allow this?

Mr Gerck would also do well to specify which FEC "standards" have the 
force and effect of law?

The only document of which I am aware is the very old FEC "performance 
and test standards for punchcard, marksense, and direct recording 
electronic voting systems", january, 1990.  Never mandated, and no 
congressional appropriation for implementation.

He might be referring to chapter 4, section 4.5, page 47, where "parity 
and checksums" are required for integrity, and "the unit must 
incorporate multiple memories in the machine itself and in its 
programmable memory devices," and these "stored images of each ballot 
must protect the integrity of the data and the anonymity of each voter, 
by such means as storage location scrambling."

He might note that the subject of cryptography does not seem to be 
mentioned.  He might also note that for punchcards and marksense, 
no "scrambling" occurs.  

Moreover, he might note that the system audit requirements later in 
the same chapter (page 49) require "a complete, indestructable archival 
record of all system activity related to the vote tally."  That is to 
accomplish a "reconstruction" of the election process (repeated several 
times).  Audit data is to be serialized by a "date-and-time stamp" and 
"preserved during any interruption of power" (page 50).

As to the matter of "law", the Congress is granted the power to set 
standards for its own election (Const Article I, Sections 4 and 5). 
The FEC isn't mentioned.

But the FEC proposed standards don't even consider networks, database 
replication with offsite storage, and as mentioned earlier, 
cryptographic security.

'nuff said.

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.1

iQCVAwUBOn37BNm/qMj6R+sxAQGgeAQAm/nj4Ro4zcLALFhIdyggFCSQphIZ3NhH
xunAksi9GyDghK7uQh8KcOZ2b16t3KEsheenmFDmx6ZDUENgnUeY7SCfyH0Egen6
2A8WS5VApivaFcV3PPCQx4/voPamaS8b5NcnDCz7ow8PYWl/bTp5vicxibjnEGpB
VuQeAms8cUY=
=njYh
-END PGP SIGNATURE-




Re: smartcards, electronic ballots

2001-02-04 Thread William Allen Simpson

-BEGIN PGP SIGNED MESSAGE-

David Honig wrote:
> 
> If you give people a paper receipt with their votes on it
> (as WAS's scheme mentions) then their votes can be bought or blackmailed.

I'm unaware of how that interpretation might have arisen?  I don't see 
anything in the proposed text that calls for a receipt to be given to 
any voter, let alone a copy of their votes?

Perhaps there is some confusion in the interoperability requirement 
that electronic ballots be stored in a printable US-ASCII format.  

Why?  Because nobody (other than mathematicians) trusts the machines! 
The threat model is (1) the machines won't work correctly, and then 
(2) the clerks will try to steal the election, and nobody will be able 
to tell for sure, because the machines are unreliable.

Specifying the interface also promotes competition for different 
components of the systems.

The requirement arises from the need for "transparency" -- the votes 
need to look like votes to humans.  The auditors need to compare the 
recorded votes.  Everything points to a simple textual requirement.

For some odd reason, the legislative staff seems to intuitively 
understand the trust paradigm that we often struggle to elucidate:
machines don't vote/spend/publish, people do.  

The use of digital signatures is to ensure that the MACHINE is 
authorized, not the humans.  The use of human readable text is to 
ensure that HUMANS can audit the result.

That means that blinded signature schemes and smartcards and fancy 
unauditable and/or uninspectable equipment are not on the table.

Anyway, this thread has gone off into rampant speculation. 

I asked for assistance in review of the technical cryptographic 
terminology.  I've received that, and I've passed the recommendations 
on to the appropriate parties.  Thank you very much.  

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.1

iQCVAwUBOn3cf9m/qMj6R+sxAQEChQP+MT1queIoc8YSlkCvmDMyTMRKO2Hz4pQ9
xgj6T0roFy5MRIExj0wLzO/DUtb8T+nsZeeHPADmQCM7u6dIqSWFYD+I3DiiAyJc
goICR8j9phqUESkeu2S5bl7uRySr/KxROBBUMLjfxtbYQFCpwLVfnEVg/I+DTorH
CWeI7K5WIm0=
=2Dkb
-END PGP SIGNATURE-




Re: smartcards, electronic ballots

2001-02-04 Thread Dan Geer



As seems universally the case in security design, there must
be ugly tradeoffs.  In particular (and without quoting acres
of prior material), the proposed requirements for verifiability
and non-coercibility are at odds and one must yield to the
other.  Paper systems make this tradeoff by, on the one hand,
the polling booth (non-coercibility once within) and, on the
other hand, the supervision of the counting process by opponents
(verifiability by proxy), at a cost of zero technology.  Bettering
this in the real world is challenging.

--dan

==
as used here

verfiability
  -- voter may verify that his vote counted as he intended it to count
non-coercibility
  -- voter cannot be compelled to show how he voted, during or after

proposition:
 If the voter can verify, then he can be coerced to do so.
contrapositive:
 If voter cannot be coerced, then he cannot verify.

==





Re: smartcards, electronic ballots

2001-02-04 Thread John R. Levine

> The voting apparatus may keep a serial record of each vote, in
> order, for auditing purposes.  This is also mentioned in WAS's
> legislative text.

Good lord no.  Here in NY, the inspectors write down each voter's name
on a log sheet with the names numbered in order, and write down the
numbers in the voter book to make it easier to cross-check who voted.
The log sheet has four or five NCR copies so that party poll watches
can have copies.  (The poll watchers use them to cross-check their
list of registered voters so they know hasn't voted and so know who to
call and remind them.)  Obviously, the ballot is only secret because
the equipment does NOT track the order in which votes were cast.

Call me a sort of a Luddite, but I would like a system where you vote
by pushing buttons of some sort, then the machine prints up a paper
ballot with your choices on it in an OCR font or something else that
is easily readable by both people and machines, and you can either
release the ballot into the box if it's right, or put it into a
discard pile and try again.  Then the machine forgets everything, and
they count the paper ballots to see who won.


-- 
John R. Levine, IECC, POB 727, Trumansburg NY 14886 +1 607 387 6869
[EMAIL PROTECTED], Village Trustee and Sewer Commissioner, http://iecc.com/johnl, 
Member, Provisional board, Coalition Against Unsolicited Commercial E-mail




Re: smartcards, electronic ballots

2001-02-04 Thread Ed Gerck



David Honig wrote:

> >First of all, that's not "privacy", that's "anonymity".
> >
> >We have voter registration precisely so that we know who the voters
> >are!  We are not changing voter registration
> >
> > Ed Gerck wrote:
> >>4. Fail-safe privacy in universal verifiability. If the
> >>   encrypted ballots are successfully attacked, even with
> >>court order, the voter’s name must not be revealed. In
>
> On Keeping Votes Secret
>
> If you give people a paper receipt with their votes on it
> (as WAS's scheme mentions) then their votes can be bought or blackmailed.
> Now, this may be an acceptable *tradeoff* (trust gained from paper trail
> vs. increased succeptability to coercion), that's not for me to decide.

The law does not allow it, and for good reasons as you mention.  Also, proposals
to print the vote usually advance it as the "silver bullet" solution.  This is a
fatal mistake because to increase realibility in communications it is much better to
have a number of independent channels than one "strong" channel (Shannon,
tenth theorem).

> One potential solution is to make the 'receipts' readily forgable --something
> anyone could print up at home, on ordinary commercial blank paper.  Such
> ready counterfeiting would deter vote buying and blackmail.

Not really. The buyer might be waiting outside the precinct, the seller might not
be able to fake it (technically -- think about the "digital divide" issues just to
have a computer), the election official might also get in collusion, etc.

> On Banning Video Cameras From Voting Places
>
> The voting apparatus may keep a serial record of each vote, in order, for
> auditing purposes.

No, it MUST not.  See the FEC standards on voting. The FEC standards also
demand "storage alocation scrambling" in order to avoid even a serial order
of storage.

> This is also mentioned in WAS's legislative text.

which is a miconception, albeit a common one

>  Now,
> if an evil vote buyer had someone recording who entered which booth
> and also had access to the audit records, the correlation lets them
> buy or blackmail votes.  Note that this requires only *one* conspirator if
> that conspirator is a poll worker with a concealed camera.

Yes, this is one of the reasons. It could also be the election official.

Cheers,

Ed Gerck





Re: smartcards, electronic ballots

2001-02-04 Thread David Honig


>First of all, that's not "privacy", that's "anonymity". 
>
>We have voter registration precisely so that we know who the voters 
>are!  We are not changing voter registration
>
>4. Fail-safe privacy in universal verifiability. If the
>encrypted ballots are successfully attacked, even with
>court order, the voter’s name must not be revealed. In

On Keeping Votes Secret

If you give people a paper receipt with their votes on it
(as WAS's scheme mentions) then their votes can be bought or blackmailed.
Now, this may be an acceptable *tradeoff* (trust gained from paper trail
vs. increased succeptability to coercion), that's not for me to decide.
One potential solution is to make the 'receipts' readily forgable --something
anyone could print up at home, on ordinary commercial blank paper.  Such
ready counterfeiting would deter vote buying and blackmail.

On Banning Video Cameras From Voting Places

The voting apparatus may keep a serial record of each vote, in order, for
auditing purposes.  This is also mentioned in WAS's legislative text.  Now, 
if an evil vote buyer had someone recording who entered which booth
and also had access to the audit records, the correlation lets them
buy or blackmail votes.  Note that this requires only *one* conspirator if
that conspirator is a poll worker with a concealed camera.

There should be little free-speech problem with this; political signs
are already banned within X feet of polling places.

David Honig

...
"What company did you say you were from, Mr. Hewlett?"
---Walt Disney to Bill Hewlett eetimes 22.01.01 p 32

 






  








Re: smartcards, electronic ballots

2001-02-03 Thread William Allen Simpson

-BEGIN PGP SIGNED MESSAGE-

"John R. Levine" wrote:
> The current election system, for all its faults, is the result of two
> centuries of effort by people not all of whom were completely stupid,
> and has a complex and not always set of features to defend against all
> sorts of schemes to corrupt an election.  The punch card ballot
> happens to be a uniquely bad technology for reasons we all know, but
> most of the surrounding infrastructure is old and kludgy but not
> broken.  We need to keep this in mind when designing something new and
> zoomy that's supposed to replace it.
> 
I could not agree more!  The purpose of the legislation is to assist 
the existing election processes, not replace them out of whole cloth!

In fact, the latest #1.3 draft changed the short title to 
``Electronically Assisted Federal Election Requirements Act''.

This discussion has digressed onto smartcards.  That's not helpful, as 
no legislator (that I'm aware of) is proposing use of smartcards, nor 
a national voting ID.  As some have noted, the specifics of this bill 
would create single use public/private key certificates, that would 
expire at the closing of the polls.

However, if there is any language that would prohibit smartcards, 
please let me know.  We are trying to be technology neutral.

And in the same vein, I forwarded Ed Gerck's list of published 
'requirements' to Lynn.  She intends to use them as a perfect example 
of what we DO NOT want!


Ed Gerck wrote:
> 1. Sixteen requirements for voting. The requirements are technologically
> neutral and can be applied to paper, electronic or Internet systems.  There
> is an extensive discussion of alternatives, before the requirements are
> summarized. Available at http://www.thebell.net/archives/thebell1.7.pdf ,
> page 3. 
> 
There are some requirements that are nearly identical to those that 
we've selected.  And I like the kudos to IETF, and open systems.

However, the first half dozen are based on the bad presumption that:

1. Fail-safe voter privacy. Define: “voter privacy is the
inability to know who the voter is.” Assure voter privacy
even if everything fails and everyone colludes.

First of all, that's not "privacy", that's "anonymity". 

We have voter registration precisely so that we know who the voters 
are!  We are not changing voter registration

4. Fail-safe privacy in universal verifiability. If the
encrypted ballots are successfully attacked, even with
court order, the voter’s name must not be revealed. In
addition, the system must provide for “information-theoretic
privacy” (i.e., privacy which cannot be broken
by computation, even with unbounded time and
resources) in contrast to systems that would only provide
for “computational privacy” (i.e., privacy which could be
broken by computation, given time and resources).

I cannot believe any security analyst worth his salt could 'specify' 
such as requirement.  When I specified computational infeasibility of 
100 years, the Science staff came back and asked how NIST would test 
that?  We reduced it to 10 years, something that might be achievable.

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.1

iQCVAwUBOnq+M9m/qMj6R+sxAQFEHQP+PCAyzyyrt/AbJ/yYI+VEm00anTOqvp4J
svSrUhl70xqHaoJ3xwl4quRZeIyjithfsLjc7L1+UsZtwBe0owSvSOeIRIUmgqD6
lmm7YH+Z5yvu1XFdHlPqNI79dUAMnz/sMDkQuQBrkD897A/GST8AeG78rA6rPGlM
HjqPSLmUldw=
=GwNT
-END PGP SIGNATURE-




Re: smartcards, electronic ballots

2001-02-03 Thread Ed Gerck



William Allen Simpson wrote:

> And in the same vein, I forwarded Ed Gerck's list of published
> 'requirements' to Lynn.  She intends to use them as a perfect example
> of what we DO NOT want!

see below, before you set yourself to re-invent the wheel.

> Ed Gerck wrote:
> > 1. Sixteen requirements for voting. The requirements are technologically
> > neutral and can be applied to paper, electronic or Internet systems.  There
> > is an extensive discussion of alternatives, before the requirements are
> > summarized. Available at http://www.thebell.net/archives/thebell1.7.pdf ,
> > page 3.
> >
> There are some requirements that are nearly identical to those that
> we've selected.

The 16 requirements include many that are either a recommended standard by the FEC
or are being considered for recommended standards.  I did not re-invent the wheel.

>  And I like the kudos to IETF, and open systems.
>
> However, the first half dozen are based on the bad presumption that:
>
> 1. Fail-safe voter privacy. Define: “voter privacy is the
> inability to know who the voter is.” Assure voter privacy
> even if everything fails and everyone colludes.
>
> First of all, that's not "privacy", that's "anonymity".

Just for you. See the technical papers in http://www.safevote.com/information.htm,
especially  ftp://ftp.inf.ethz.ch/pub/publications/papers/ti/isc/wwwisc/HirSak00.pdf
and its references. See Gennaro's paper quoted at the end, as well.

Further, see also my posting here of Oct/99, in which I wrote:

The current useful voting properties as proposed by Fujioka,
Okamoto and Ohta, 1992, and  Benaloh and Tuinstra, 1994, are:

1. Completeness: All valid votes are counted correctly, if all participants are honest.

2. Robustness: Dishonest voters, other participants or outsiders can't disturb or 
disrupt
an election.

3. Privacy: The votes are casted anonymously.

4. Unreusability: Every voter can vote only once.

5. Eligibility: Only legitimate voters can vote.

6. Fairness: A voter casts his vote independently and is not influenced (e.g. by 
publishing
intermediate results of the election, copying and casting of the encrypted vote slip of
another voter as his own vote).

7. Verifiability: The tally can not be forged, as it can be verified by every voter. 
The
verifiability is locally, if a voter can only check if his own vote if counted 
correctly. If
it is verifiable whether all votes are counted correctly, then the verifiability is 
universally.

8. Receipt­freeness: A voter can't prove to a coercer, how he has voted. As a result,
verifiable vote buying is impossible.



> We have voter registration precisely so that we know who the voters
> are!  We are not changing voter registration

You are mixing apples with  speedboats. The 16 requirements apply especifically to
voting, as it says. Of course, in voter registration the election officials must know 
who
the voter is (and more -- where the voter lives, etc.).

BTW, there are other requirements being discussed especifically to voter registration,
and here privacy will also be a BIG issue.  One that is being infringed today by 
third-party
voter registration services that transfer the voter data to the state but keep copies, 
which
copies they are legally allowed to share with their 'affiliates' (read: anyone that 
signs a
contract with them).

> 4. Fail-safe privacy in universal verifiability. If the
> encrypted ballots are successfully attacked, even with
> court order, the voter’s name must not be revealed. In
> addition, the system must provide for “information-theoretic
> privacy” (i.e., privacy which cannot be broken
> by computation, even with unbounded time and
> resources) in contrast to systems that would only provide
> for “computational privacy” (i.e., privacy which could be
> broken by computation, given time and resources).
>
> I cannot believe any security analyst worth his salt could 'specify'
> such as requirement.  When I specified computational infeasibility of
> 100 years, the Science staff came back and asked how NIST would test
> that?  We reduced it to 10 years, something that might be achievable.

You are, again, mistaken. See the classical paper by Rosario Gennaro and others,
at  http://www.research.ibm.com/security/election.ps BTW, this is their remark on
this (and, voter privacy):

  Privacy of an individual vote is assured against any reasonably sized coalition of 
parties (not
  including the voter herself). That is, unless the number of colluding parties 
exceeds a certain
  threshold, different ballots are indistinguishable irrespective of the contained 
votes. We say
  that information­theoretic privacy is achieved when the ballots are 
indistinguishable indepen­
  dent of any cryptographic assumption; otherwise we will say that computational 
privacy is
  achieved.

BTW,  my replies above might also indicate that the US election process would be much
improved if proper attention is g

Re: smartcards, electronic ballots

2001-02-02 Thread John R. Levine

>>Hmmm, I have a "voter registration card" and I believe that is the case
>>across the USA.

Here in New York, the county sends you a card when you register, which
all but the most anal then lose.  I used to be an election inspector,
and I can report that we never asked for the cards, and I can't ever
recall anyone offering one.

The ID process was, basically, voters said who they were, we looked
them up in the book, they signed next to their name and we looked to
see if the signature matched the one on file.  When you register the
form requests but does not require info like height, age, and eye
color which was in our book and we also checked if available.  In the
event that someone's signature or other info didn't look right, we
could ask for more ID but I can't recall that we ever did.  Equally
important, most of the inspectors were retired folks who'd lived in
the area for a long time and knew many of the voters by sight.

The current election system, for all its faults, is the result of two
centuries of effort by people not all of whom were completely stupid,
and has a complex and not always set of features to defend against all
sorts of schemes to corrupt an election.  The punch card ballot
happens to be a uniquely bad technology for reasons we all know, but
most of the surrounding infrastructure is old and kludgy but not
broken.  We need to keep this in mind when designing something new and
zoomy that's supposed to replace it.

-- 
John R. Levine, IECC, POB 727, Trumansburg NY 14886 +1 607 387 6869
[EMAIL PROTECTED], Village Trustee and Sewer Commissioner, http://iecc.com/johnl, 
Member, Provisional board, Coalition Against Unsolicited Commercial E-mail