Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Privacy Security

Ask Slashdot: Why Haven't We Implemented Public Key Infrastructure Voting? 433

Long-time Slashdot reader t0qer has a question: why haven't we gone to an open source, Public Key Infrastructure-based voting system? "I'm fairly well versed in PKI technology, and quoting this site, it would take traditional computers 300 trillion years to break RSA-2048 for a single vote." SSL.com has a pretty interesting piece on using Public Key Infrastructure in voting. There's also a GitHub project that leverages PKI and IBM blockchain technology...

It just seems like paper at this point has outlived its secureness. A closed sourced voting system doesn't really seem like the kind of thing Slashdot would really get behind.

SSL's article points out that the technology seems to exist already. Nearly half the population of Estonia already votes online, and four U.S. states (Arizona, Colorado, Missouri and North Dakota) already have web portals that allow for absentee voting. (And West Virginia has a mobile voting app that uses blockchain technology.) [L]uckily, the groundwork for securing the practice of remote, online voting is already there. We have been conducting many delicate transactions online for some time — the secure transfer of information has been a cornerstone for many industries that have successfully shifted online such as personal banking and investing, and those methods of securing and authenticating information can be employed in voting as well. For years, people have suggested that the use of blockchain technology could be used to secure elections and increase voter turnout.
Share your own thoughts in the comments. Why haven't we implemented Public Key Infrastructure voting?
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Why Haven't We Implemented Public Key Infrastructure Voting?

Comments Filter:
  • Fraudbait (Score:4, Insightful)

    by galaxy ( 212802 ) <samuli.sorvakko@net> on Monday November 23, 2020 @01:59AM (#60755828)

    Because a robust PKI-verified vote is a prerequisite for verifiable vote buying. The problem case is almost completely unlike e.g. online banking, which anyone "well-versed in PKI technology" should realize by themselves.

    • by skids ( 119237 )

      The anonymization of the ballot is often neglected in these schemes, I'll have to RTFA to see how it is dealt with there. Mail/absentee voting is also inferior in the area, but fortunately there is no evidence of significant abuse in major elections, yet.

      But as to TFA the basic problem is the system needs to be explainable to the voters. The vote must not only be accurate, but also trusted. Paper systems have the same issues... for example there were a bunch of "poll observers" this time who skipped thei

      • by Rei ( 128717 )

        The anonymization of the ballot is often neglected in these schemes

        Quite to the contrary, it very much isn't. Indeed, in a properly designed system, you can't even prove to others who you voted for [slashdot.org] - you can only prove it to yourself.

        And re: trust, the ability to use any additional device to verify your votes - such as casting a vote on a computer but verifying it with your cell phone, or even at an registrar's office if you're paranoid - at any point up to or after the election - is certainly a voter conf

    • using their private key, they could replace their vote in the system any number of times during a month long voting period.

      It's not possible to verifiably buy that vote, without buying/borrowing the person's private key.
      One way to prevent buying the person's private key might be to have the private key be actually two private keys, each encrypted with a password that the voter chooses when registering to vote. In the voting system, both keys appear to the voter to "work" at casting a vote, however one passw
  • by ludux ( 6308946 ) on Monday November 23, 2020 @02:02AM (#60755838)
    And paper is still secure. The US just had the most secure and vetted election in the history of elections ever, and most of that was done by paper. The only reason - the only reason - to try to switch to any kind of electronic voting, no matter how supposedly 'secure', is to try and rig the election. If there is no paper trail, there was no valid vote - and if there is a paper trail, why not just use paper to begin with?
    • I'm going to go ahead and say its balance is zero. Sorry about that.

      Oh wait, that never happens.

      Because data, when properly secured and validated, is secure and valid.
    • you seem to be unbelievably ignorant of the history of voting fraud in these United States, mostly done by paper for well over a century.

      • by bhcompy ( 1877290 ) on Monday November 23, 2020 @05:23AM (#60756216)
        Yes, and paper voting fraud risk is relatively minor compared to the risk from electronic voting. With modern tracking systems like Oregon and California have, paper ballots are cheap, traceable, verifiable, simple by design, difficult to cast fraudulent ballots in large quantities, and reliable. Electronic voting systems are expensive, complex, not easily verifiable or traceable*, less reliable, and one security breach could lead to countless fraudulent ballots. For universal systems, cheap, simple, and reliable are the most important factors by far, and electronic voting fails all three of those factors in comparison(reliability depends on the system, but you don't hear about polling stations shutting down while they scramble to fix black ink pens).

        * - Many systems include no paper trail, which means audits are severely hampered, but, if you need a paper trail to provide verifiability and traceability, perhaps you should just use paper
    • by r2kordmaa ( 1163933 ) on Monday November 23, 2020 @07:18AM (#60756378)
      I'd say mostly because paper is just plain inconvenient. The point is to get as many people to vote as you can and for that you have to make it quick and easy. The queues you have on your side of the pond are ridiculous, clearly you are doing things wrong if people have to wait for hours just to vote. https://www.bbc.com/news/elect... [bbc.com]
      • clearly you are doing things wrong if people have to wait for hours just to vote.

        Living in the UK, we have a paper ballot system, and it takes me about ten minutes to vote, with virtually no queues. I go to a checkin desk, and give my name and address. They cross me off a printed list, and give me a ballot paper. I go to a private booth, mark my choice, then drop the ballot through a slot in a box. This process has the great advantage that you do not need any technical qualifications to operate it, and to see how it works. I consider this of vital importance to democracy, where the peop

    • My thought is crypto systems and electronic methods should supplement rather than replace paper. For instance if you did have a robust PKI system in absentee ballot you could replace the ink signature, w/ scanning a barcode and having you're ID card generate an OTP for that ballot. It reduces the skill needed to check signatures and there is no gray area, either the 10 digit number is correct or it isn't.

      Electronic terminals can increase accessibility (large text, braille terminals, many translations,) an

  • by sound+vision ( 884283 ) on Monday November 23, 2020 @02:03AM (#60755844) Journal

    300 trillion years to vote? It was bad enough that it took an hour. And, the wounds in our democracy will take long enough to heal without adding Open Sores. And what happens when I lose my key?

  • by dbase4 ( 1074555 ) on Monday November 23, 2020 @02:05AM (#60755846)
    the same reason that PKI hasnt taken off anywhere with the general public: they don't get it. when it's been tried, people lose their private certs when they swap devices, and get confusede. only IT people really use it. the best way forward i think is to have the private cert on a token or somethinbg like a yubikey: plug and play PKI.
    • by k6mfw ( 1182893 )
      Exactly. Unless you have been well trained along with good technical knowledge, PKI sounds like some agency in China.
  • Lack of (Score:4, Insightful)

    by simlox ( 6576120 ) on Monday November 23, 2020 @02:07AM (#60755852)
    Transparency. You have to trust advanced technology. Who can check everything is correct? Can common man check what is going on? Anonymous voting and voting pressure: it is very important that nobody can pressure anyone into voting on a specific candidate. Imagine you employer fired you for voting on specific candidate. There shall be no way that anyone can find out what you voted, and it shall not be possible to look over your shoulder either. You should have no way of showing anyone what you voted, either. "But you can take a picture of your ballot and give it to the one pressuring you". At least here in Denmark, you can do that, but instead of putting it into the box, you can go back to the voting attendees, and ask for a new one, and discard the old one. That way the picture has no proof that you voted a certain way.
    • Re:Lack of (Score:5, Insightful)

      by jrumney ( 197329 ) on Monday November 23, 2020 @02:22AM (#60755876)

      Most of all, if it can't be explained to the masses, no amount of theoretical technological robustness is going to convince people that it isn't just a way to hide more fraud.

      • Most of all, if it can't be explained to the masses, no amount of theoretical technological robustness is going to convince people that it isn't just a way to hide more fraud.

        Hell you can't even convince the IT security experts. The public is easier to convince that those who understand the technology.

      • by tchdab1 ( 164848 )

        Agree: obvious transparency is the key (so to speak). No black boxes or devices. The system must be obvious, understandable, and auditable to people without IT or math degrees, pretty much the only requirement is basic literacy and counting skills. So that hundreds of thousands of people across the country (involved in conducting the election but also in voting) can come to the same conclusion, know how they did it, and feel confident no one else tampered with it. Hard to beat hand-counted paper ballots.

    • and can change your vote any number of times up to the deadline.

      That way, no one can force you to vote a certain way, and you can't prove to them you voted a certain way, unless they kidnap you for the month, in which case you have bigger problems than voting.

      This is the functional equivalent of the Denmark system you mentioned.
  • Signing a 'vote' is the easy part, its all the other stuff behind it is the hard part.

  • I'll just leave this here [youtu.be]. We'd probably benefit more from ranked-choice voting/polling.

  • by Nocturrne ( 912399 ) on Monday November 23, 2020 @02:12AM (#60755862)

    Those in power want things to be a mess so they can exploit all of the loop-holes.

  • by pirodude ( 54707 ) on Monday November 23, 2020 @02:27AM (#60755884)

    Please explain to your parents how they should trust that their vote is secure with PKI. I'll wait...

    Voting requires trust and anonymity. Having anonymous electronic bits that can be silently manipulated by dedicated actors makes it a solution that is impossible to trust. You cannot convince a large enough group of the population that it's trustworthy. Hell, we have people that are claiming that the paper ballots are being manipulated even with no evidence of it. All you need to do is put some doubt in people's minds and it will unravel quickly.

    Everyone loves to use banks as examples of industries that can make a secure system. Except they're hacked regularly and people are constantly defrauded. Banks are able to keep trust by /not/ having anonymity. They're able to go in and fix transactions. If you slip up and give your credit card number to a phishing website they can revert all the transactions because they know who you are and what you did. Voting requires anonymity so it's not possible to fix situations where people are tricked or coerced into voting a certain way.

  • by 93 Escort Wagon ( 326346 ) on Monday November 23, 2020 @02:30AM (#60755888)

    It won't happen because most people can't understand the explanation regarding why it would be secure.

    Not to mention that it's not really necessary. Paper ballots are pretty darn secure.

    • ask your 18 year old how it works, and if they don't know, ask them to ask their nerd classmate.

      But seriously, there would be a pool of 10s of thousands of comp sci grads and hundreds or thousands of cryptography and blockchain experts who could opine on the security of the system. A consensus opinion would quickly form, aided by a $1 million security bug bounty.
  • by jmauro ( 32523 ) on Monday November 23, 2020 @02:44AM (#60755908)

    PKI is good for a lot of things, but sometimes it's best not to over think this.

    1) The voting with PKI in the paper assumes there are national ID cards. The US doesn't have that or anything close to that.
    2) Voting needs to work with the actual citizens of this country, some who don't have computers, most who don't have an ID card reader, etc
    3) Voting needs to work ALL the time. Power outages shouldn't stop the polls, computer problems shouldn't stop the polls.
    4) Voting needs to be verifiable by anyone easily.

    Some of these schemes will work on the small scale, but paper and pen\pencil methods while the seem archaic actually do the job quite well. Adding computers into the mix as the one guaranteer of the vote will just make things worse, as states that went to all computerized systems found out after they were all the rage in 2000. They're just too complex, assume a technical sophistication of everyone, cause too many issues on the day of, and people really freak out once they find out there is no good paper trail, so they've all been retired or in the process of being retired.

    Also this [xkcd.com]

    • Re: (Score:3, Informative)

      by hemna ( 205532 )

      1. The US does have national ID card now, it's called SecurID and is required (or passport) by every citizen to get on an airplane.

      Democrats will just cry racism when talking about requiring an ID to vote, but where were they when they voted to require a national ID (SecurID)
      to travel by airplane.

  • by seebs ( 15766 ) on Monday November 23, 2020 @02:51AM (#60755918) Homepage

    You can have ballots without being able to identify who cast them, which is to say, people can vote without being targeted for their votes if the wrong people get access to the ballots.

    Vote fraud is, by and large, very close to a complete non-issue in the US. There's a handful of people doing individual-scale vote fraud, probably, and they seem to get caught, and larger-scale things are vanishingly rare, because nearly everyone agrees that this would be bad, and they're on the lookout for it. So, yeah, we have definitely had some known cases, but... Chicago's big illicit voting problems were in the 1960s, and the reason that's still the go-to example is that it's one of the only ones we've had.

    Vote suppression is at least as effective and much easier to get away with.

    Any of the alternatives like ranked-choice or strict approval would produce better results, in general. And we might yet get there some day; ranked choice voting is actually very popular with people, but not as popular with political parties.

    (You can, BTW, safely disregard the surreal conspiracy theories about how much fraud there is, or you can spend a bit of time reading careful writeups of them, but honestly, once you see the list of Minnesota cities presented as evidence of fraud in Michigan, you sort of know what the quality of work you're looking at is going to be.)

  • 300 trillion years to break RSA-2048 for a single vote."

    If I give you a public key - it will take 300,000,000,000,000 years, if I give you 200,000,000 public keys it will take you 1.5M year. Now I I build a beowulf cluster of 10,000 of those standard computers, that gets you to 150 years. This starts getting into the range that I can create an ASIC to mount onto the PCI bus so that I can accelerate each computer by 1000 that gets us to about 8 weeks with todays technology to get each one...

    Now convince me that my dad will be able to create, safely store, and r

    • It just records a bit, meaning that that public key has voted.
      The actual ballot, once decrypted, should get re-wrapped in the voting system's own encryption, and sent by a completely separate data path to the vote recording blockchain, after going through a random mixer to decouple the time of arrival of the ballot from the time order that the "has voted" bit is associated with the public key.
      The fact of that public key having voted can be stored on a separate blockchain.
    • If I give you a public key - it will take 300,000,000,000,000 years, if I give you 200,000,000 public keys it will take you 1.5M year.
      No, it will take 300,000,000,000,000 times 200,000,000 years. Seriously? Such strong math problems?

      I give you my public key - that identifies me as the voter. I send my ballot in, the election system identifies me, decrypts and authenticates my ballot.. now has my ID and vote pretty close to one place
      That is not how public/private keys work. No one knows your private key, t

  • by bistromath007 ( 1253428 ) on Monday November 23, 2020 @02:55AM (#60755930)

    If a machine is involved in any way, it is possible, however difficult you make it, to screw around with it in a way that can't be proven. Every election that makes use of a machine should be considered invalid.

  • Someone would have to propose an actual system, preserving the (notional) guarantees of the current system (at least anonymity and without property or tax qualifications), for us to be able to comment on why we hadn't actually implemented such a system.

    Estonia still uses paper ballots, a lot of people still use them - we could certainly (as some localities have done) implement a similar partial e-voting system, but that wouldn't answer the premise behind the question. Also of course at a bare minimum you'd

  • by Voyager529 ( 1363959 ) <voyager529@ya[ ].com ['hoo' in gap]> on Monday November 23, 2020 @03:01AM (#60755950)

    Voting is a very difficult problem to solve digitally because of the nature of the parameters inherent in voting:

    1. Voters need to be able to be identifiable as voters.
          a. Entities who are not eligible to vote (e.g. Russia) need to be prevented from casting votes.
          b. Entities who are eligible to vote need to be prevented from submitting duplicate votes.
              i. This cannot use IP addresses or devices, as it is as possible for one device/IP to be used by multiple eligible voters as it is for a voter to have multiple devices.

    2. Votes need to remain secret.
          a. Voters may not be tied to their ballots, and must be assured that they are not.
          b. Votes need to be secured in transit.
          c. Votes need to be secured at rest.

    3. Votes need to be verifiable.
          a. Votes need to be verified as being submitted successfully.
          b. Votes need to be capable of being subjected to a recount individually.

    Now, I'm by no means an expert on how certificates and PKI and all of those things work. What I understand of it, though, is that PKI does nothing to solve Problem 1, can help to a certain extent in certain parts of problem 3, and can only be involved in #3 by subverting #2.

    Estonia works because, according to TFA, the key is part of an ID card. Now you've taken a baseball bat to the hornet's nest of "Voter ID requirements" that is highly controversial. Moreover, TFA says that the private key on the ID card is being used for signing documents and verifying authenticity of documents other than ballots, meaning that one's private key is tied to a real world identity, meaning that ballots aren't secret anymore.

    Browser-based methods of voting need to validate the end user somehow, and can't used devices or IPs to do it - one voter could have multiple devices, or a single device could be used by multiple voters. The "Digital Divide" that is heavily discussed in terms of education is now doubly exacerbated by being a barrier for low income voters, and you'd have to somehow validate the voter as a voter, not as a taxpayer or land owner, that works on iOS and Android and Windows and OSX and Linux and isn't a hardware token or device ID or phone number or IP address.

    The ultimate answer here, is that PKI doesn't solve most of the issues with election security. It helps in certain steps of the process, but those are the "easy" problems to solve. It's making sure that there is one vote per voter, no more and no less, in a way that also prevents votes and voters from being paired together while also allowing for independent audits and recounts.

    Pretty much every technical solution involves a compromise. Hand out keys at the DMV? Great, you've just advocated for Voter ID laws. Allow self-generation of private keys, upload public keys, and sign a vote with a public key? Great! you've just ended the secret ballot. Use some variant of a Google Form? Great! You've just allowed foreign actors to vote. Use a state-issued CA to validate private keys? Great! You've got one hell of a single point of failure there.

    Paper may well have its issues, but paper ballots seems to be the solution to all of these almost-conflicting requirements. The issues, for the most part, aren't technical.

    • by snadrus ( 930168 )

      You're right, the voting requirements are near-contradictory.

      I'd go further to suggest they're flawed:
      - Someone's vote going public means: {"my_name": "my_vote"}
      However if someone has an ID known only to the state, it becomes: {"my_state_secret_id": "my_vote"}

      Anyone unmasking vote-to-user info would be immediately criminal and therefore questionable regarding the facts they bring.
      Being provided your ID would resolve #1 and it being "mostly" secret handles the revised #2.

      If everyone's vote included a rec

  • by zyche ( 784345 ) on Monday November 23, 2020 @03:02AM (#60755954)

    https://www.youtube.com/watch?... [youtube.com] - "Why Electronic Voting is a BAD Idea"
    https://www.youtube.com/watch?... [youtube.com] - "Why Electronic Voting Is Still A Bad Idea"

  • by account_deleted ( 4530225 ) on Monday November 23, 2020 @03:03AM (#60755958)
    Comment removed based on user account deletion
  • That 300 trillion years number is nonsensically false - -it's for a 1 Ghz desktop computer circa year 2000 without using a GNFS algorithm. Using GNFS, 1024 is doable today with about 1 month on just the top publicly known super computer. Think about it .. someone cracked 829-bit RSA earlier this year on some desktops. Given the reduction in cost of computing and the scaling of supercomputers .. we should be able to crack 2048 encryption within 10 to 20 years .. and even that's assuming no signification brea

  • by Dusanyu ( 675778 )
    https://xkcd.com/2030/ [xkcd.com] Keep the computers out of voting check the box next to the name of the person you want to vote for, then place the ballot in the slot of a locked box works, it's hard to get confused with something so simple.
  • The election process is already pretty good (though inconsistent). The whining about cheating would be just as vocal, except the conspiracy theories would be that someone has a master key that they use to change votes or that there are known flaws being exploited to help X win over Y or that it has been made intensionally complex to hide fraud etc etc. In fact the more complex you make it the more conspiracy nut jobs ,like Trump, will have a field day as they rely on people not understanding the process to
  • SSNs are not a password. Why not issue citizens private keys at birth and a public key registry? And have a robust reset solution for lost or stolen keys?
  • by Sique ( 173459 ) on Monday November 23, 2020 @03:55AM (#60756048) Homepage
    Many proponents (I would rather say: all of them) of computer based voting are not seeing one problem.

    Voting has several criteria to fulfill:

    • general: every citizen, independent on status, income, gender, family origin, religion etc. has the right to vote.
    • free: No one can pressure you to vote a certain way.
    • equal: Each vote counts the same.
    • secret: No one except you knows, how you voted, and there is no way to find it out.

    The first one is ridden with problems no computer can solve: How to determine if someone is eligible to vote? Voter suppression by making it more difficult for some people to vote than for others is a social problem. While electronic voting can solve each of the other requirements, it is not able to solve all of them at the same time. One big problem is to allow for both equality (fairness of the count) and secrecy (non-attributable vote). Your vote has to stay secret, so no one can prove how you voted. Otherwise your vote can not be kept free, because you individually can be made responsible for how you voted, either by paying you to vote a certain way or by forcing you to cast your vote in the desired way. But if your vote is secret, there is no way to prove that it got counted correctly. You simply have to trust the people who set up the computer that they do their job correctly, and that the software is bug free enough, as you can not watch the count (and in the current election, watching the count was one of the big issues in countering numerous claims of voting fraud). Yes, with Open Source, some people can check the integrity, but most people are not able to read and understand source code, and even for specialists, it is time consuming to individually read through very long computer listings and make sure, neither glitches nor intentionally obfuscated tampering slips through.

    Paper ballots are the counter example. They are simple enough, that everyone understands how they work by simply looking at them. And it's easy to have people watch the count and convince themselves that the count is fair. Additionally, you can have the whole voting process in public, from shipping empty ballots to the voting places to handing then out to the single voter, checking the eligibility of the voter and watching them putting the ballot in the ballot box. You can hide the actual casting of the vote in the vote booth without tampering of the integrity of the whole voting process. You can effectively prevent things like ballot stuffing by keeping an eye on the ballot boxes from sealing the proven empty box to breaking the seal for counting and then counting the whole contents of the box.

  • by kaur ( 1948056 ) on Monday November 23, 2020 @04:15AM (#60756082)

    Writing from Estonia.
    I authored the first risk analysis of the Estonian internet voting system in 2003 (with others).

    Our path to secure voting started from:
    a) secure online identity - government-issued identity cards with two certificates (digital signature and TLS client authentication)
    b) getting all your daily services online
    c) getting the population used to using the ID cards
    d) public education campaigns about cyber hygiene, especially using those cards

    You cannot provide a _single_ secure service online. People won't know how to use it and the human component will fail.
    You start from putting all your banking online (we believe we had the world's first Internet banking applications in the nineties), students accessing their schools online, parents accessing their children's records in the schools, all _other_ government services, utilities, everything.
    Only then do you tackle voting.

    Few other things to note:
    - Our ID cards are not mandatory to use for anything, you can still do everything in person.
    - The government pushes for transparency in digital communications. This really works. Any citizen can monitor the requests or queries that government agencies have made about them to any other agency; it is an online service, free of charge, and near-real time. This is possible by all agencies using a single, secure and auditable system to exchange data. Think "enterprise message bus" with authentication, authorization and signatures but on country level;
    - We have a recent history of living in Soviet Union, so we have engineered the systems to proactively avoid any "big brother" scenarios;
    - There are mechanisms to fight coercion, privacy and other voting-related risks;
    - The voting implementation is completely public - from crypto protocols and security analysis to source code and deployment notes. Everybody is welcome to compile, run and test a copy of the system himself.

    Do I recommend the same system to the US?
    No, I don't and I cannot.
    Estonia is small, we can agree on protocols and implement them on country level.

    • by kaur ( 1948056 )

      Estonia was lucky to establish government-based digital identities _before_ Facebook and Google appeared.

      Now the global identity market is hijacked by a few US companies. All governments save China, India and Russia are thus in a stalemate. There is no incentive for establishing a national online identity when everyone can "log in with Facebook". But would you build voting on this?

    • by kaur ( 1948056 )

      The Estonian i-voting documents are available here:
      https://www.valimised.ee/en/in... [valimised.ee]
      Technical docs include principles, architecture, code, crypto and so on.
      Organizational docs include procedures, auditing guidelines, audit reports, risk assessments etc.

      Secrecy and anonymity are reached by a "double envelope" protocol using PKI and role separations.
      There are two servers, say "outer" and "inner".
      - the voter creates a "vote"
      - encrypts the "vote" with the inner server's public key, creating an "inner envelope"
      -

  • by jd ( 1658 ) <imipak@ y a hoo.com> on Monday November 23, 2020 @05:25AM (#60756222) Homepage Journal

    First, some States send cards or voter information packs to voters just before an election. Nothing stops them sending a chip or SIM card with that pack.

    Second, it is assumed that PKI voting has to mean remote voting. Why? What's wrong with machines at polling station using your chip to digitally encrypt your vote to prevent editing afterwards?

    Third, it is assumed that PKI voting can't use paper. What's wrong with the voting machine printing your ballot with the digital signature in ASCII armoured format, then keeping the signed encrypted ballot - or even just the signature with no ballot - for electronic transmission? That way, you can prove the number of ballots counted must equal the number of ballots cast.

    Fourth, it's assumed PKI isn't anonymous. Why shouldn't it be? A machine can program a chip with a public key whilst keeping the private key in a tamper-resistant location. It can also send the chips out by fedex. The only room anyone needs access to is the mail room, the server room can be physically secure. If the machine is A1+ on the Orange Book scale, with all the implied hardware requirements, neither election officials nor anyone else is going to have access to the private keys, and only the the recipient has access to the public key.

    Fifth, it's assumed that just because ballot stuffing is very rare that ballot omission is also very rare. West Virginia had a recent case where a candidate "collected" postal votes from elderly residents and threw away those not for him. South Carolina, in the 2000 election, saw votes being found after the fact stuffed behind furnishings. And in the most recent election, fake ballot collection boxes were put out. Wonder why those don't get mentioned much in the fake votes protests. Oh, it's because it's the same side that's claiming fake votes. The PKI system I've proposed in the past and outlined here would prevent this sort of fraud -- which we know does happen -- as well as the box stuffing (which we don't).

    Yes, these are expenses. I'm not even going to claim they're that useful or solve any real or significant problem. (You'll notice I gave three examples for all of the districts in all of the States across 20 years. That's because I can't think of any others.) Not the point. The point is that the aforementioned objections are invalid assumptions. Can we focus the debate on the real objections, because there are many and we don't need to be side-tracked.

    So, for those who like it in one place, here's the proposal I have for PKI voting.

    1. Machine in a secured, shielded room, A1+, running a single piece of software written using formal methods, programs and tests chips in the same manner a credit card company or a SIM chip company would, containing the public key but no PII. These cards are sent to be delivered by FedEx to voters. Private keys are retained, public keys are not.

    2. Machine voting at polling stations would print out a paper ballot containing the ASCII armoured digital signature of the vote. This ensures that a vote is attributable to having been cast by a voter, that the voter has cast one vote and that the vote is unmodified. The signature is kept by the machine. The count of signatures must match the count of paper ballots, proving no votes added or deleted. Encrypted copies of the votes may also be kept, so that the central machine can produce an electronic tally. Since the signatures are unattributable to individuals, they can be sent to any observers or the media, who can verify that the counts match up.

    3. Postal ballots would be replaced by a robust, impact-resistant, tamper-resistant embedded computer but would functionally be no different. Where witnesses are needed, you'd need a counter-signed digital vote. Yes, there's the risk of intimidation, but there is with any postal ballot. It's not different here, except that as the vote is encrypted, you've reduced the risk of people destroying ballots because they're for the wrong person. You've not eliminated a threat, just reduced the scope a l

  • by jaa101 ( 627731 ) on Monday November 23, 2020 @05:27AM (#60756228)

    Most people can understand every aspect of paper voting and counting. Nobody can comprehend every aspect of voting involving computers because they're just too complex: Together the BIOS, OS, drivers, voting software, etc. will have millions of lines of code. Yes, there are ways to attempt to rig paper ballots but there are always going to be way more ways to rig electronic voting.

    If you want to have computers help, program them to OCR the paper ballots so you can spit out a quick result. That way you still have the paper around for a manual recount if there are any suspicions.

  • by bradley13 ( 1118935 ) on Monday November 23, 2020 @05:36AM (#60756240) Homepage

    Having super-duper-secure cryptography isn't the point. The single most important requirement is having a system so simple and transparent that Joe Sixpack and Sally Soccermom can understand it, and will trust it.

    Touting cryptographic algorithms does not meet that requirement. Having votes disappear into an electronic gizmo does not meet that requirement. Frankly, the only thing that does is paper-based ballots.

  • by Junta ( 36770 ) on Monday November 23, 2020 @08:48AM (#60756538)

    The logistics of voter ID is considered problematic enough to cause disproportionate disenfranchisement of certain voter groups, could you imagine trying to get people to go through the trouble of acquiring and maintaining the private key material/devices/whatever you are planning.

    There's a reason even 2FA is not a mandatory thing in a lot of financial services businesses, where the stakes for an individual compromise are higher.

    It's one of those things that sounds great to a technology person thinking about the theory of something, but in practice would be a nightmare to try to implement for every voting citizen.

    It wouldn't even stop these cries of 'election fraud' happening currently. He's been prepping to call 'election fraud' no matter what for the last 4 years. If the signing was simply to submit ballots, but the ballot ownership was secret, he'd claim vote counters would open the envelopes, stack up the legitimate ballots, then shred them and replace with a count of favorable ballots. If you gave up on secret ballot (a terrible idea), then they'd *still* claim dead people are voting as an explanation. There's always a place to shout 'election fraud' if you don't care about actual evidence, no matter how far you take things. Heck, they might even claim 'hackers broke the encryption', which technical people would recognize as an outlandish claim, but the problem is that the average citizen can't evaluate the veracity of such a claim. They would be told to distrust the 'deep state' that's conspiring to tell you this system is secure so they can manipulate it as much as they want.

    In short, this isn't a technology problem to solve.

  • It just seems like paper at this point has outlived its secureness.

    Do NOT make the mistake of taking paper out of the process. Paper is compatible with electronic voting, and IMO is *required* for securely auditable voting. Without paper, numbers come crawling out of machines and they're very hard to contest without being a computing genius with the right access to the machine. Paper solves this. Here is how the process works:

    • * Person walks up to electronic voting machine, enters their candidate choices.
    • * Machine prints out person's choices.
    • * Person inspects choices, verifies them, and drops the paper into a box.
    • * Electronic tabulations of votes follow, BUT they are spot-audited by randomly choosing a given machine and comparing its numbers to a paper count. If the numbers don't match, there is a problem.
  • by dskoll ( 99328 ) on Monday November 23, 2020 @09:38AM (#60756642) Homepage

    Because electronic voting can never be made secure and is never going to be trusted.

    Because a larger issue than fiddling with voting systems is figuring out how to stop demagogues from undermining trust in democracy.

    Here in Canada, we vote using paper ballots. In the entire history of the country, there has never been the slightest suspicion of material electoral fraud. Technology is not the problem and it won't be the solution.

  • by Frankie70 ( 803801 ) on Monday November 23, 2020 @10:38AM (#60756898)

    > Luckily, the groundwork for securing the practice of remote, online voting is already there.

    Voting from home, voting by mail all break "Secret Ballot which is one of the core securities of voting.

    If someone offers to pay you 100$ for voting for his party, you could take that 100$ & still vote for someone else at the booth because he has no way of verifying who you voted for at the booth. Because of SECRET BALLOT.

    Likewise, if someone is threatening you.

    But there is no secret ballot with voting from home or mail-in ballots.

    Most countries have laws which insist on "Secret Ballot".

    The right to hold elections by secret ballot is included in numerous treaties and international agreements that obligate their signatory states to do so.

    https://en.wikipedia.org/wiki/... [wikipedia.org]

  • by WindBourne ( 631190 ) on Monday November 23, 2020 @08:04PM (#60759584) Journal
    Before you can have digital voting, we must have vetted digital certificates. We have real ID now because of so many screwy things.

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...