Re: voting

2004-04-21 Thread Ed Gerck


David Jablon wrote:

 ... *absolute* voter privacy
 seems like an unobtainable goal, and it should not be used to trump
 other important goals, like accountability.

But it IS assured today by paper ballots. Nothing less should be
accepted in electronic systems, otherwise new, easy and silent
fraud modes become possible. Coercion and vote selling are just
the most obvious.

Ed Gerck



Re: voting

2004-04-19 Thread Ed Gerck


Yeoh Yiu wrote:
 
 Ed Gerck [EMAIL PROTECTED] writes:
 
  The 'second law' also takes precedence: ballots are always secret, only
  vote totals are known and are known only after the election ends.
 
 You get totals per nation, per state, per county, per riding,
 per precinct, per polling stion and maybe per ballot box.

The lowest possible totals are per race, per ballot box. The 
'second law' allows you to have such totals -- which are 
the election results for that race in that ballot box. For 
example, if there are two candidates (X and Y) in race A ,
two candidates (Z and W) in race B, and only one vote per 
candidate is allowed in each race, the election results for 
ballot box K might be:

Vote totals for race A in ballot box K:
  Votes for candidate X:  5
  Votes for candidate Y: 60
  Blank votes:   50

Vote totals for race B in ballot box K:
  Votes for candidate Z: 45
  Votes for candidate W: 50
  Blank votes:   20

Total ballots in ballot box K:  115

Because only the vote totals are known for each race, a 
voter cannot be identified by recognizing a pre-defined, 
unlikely voting pattern in each race of a ballot. This 
exemplifies one reason why we need the 'second law' -- to 
preserve unlinkability between ballots and voters.

 So there's a need to design the system to have more voters
 than ballot boxes to conform to your second law.

No. All you need is that there should be more than one voter
per ballot box. This is a rather trivial requirement to meet.

Cheers,
Ed Gerck



Re: voting

2004-04-16 Thread Ed Gerck


David Jablon wrote:
 
 I think Ed's criticism is off-target.  Where is the privacy problem with
 Chaum receipts when Ed and others still have the freedom to refuse
 theirs or throw them away?

The privacy, coercion, intimidation, vote selling and election integrity
problems begin with giving away a receipt that is linkable to a ballot. 

It is not relevant to the security problem whether a voter may destroy 
his receipt, so that some receipts may disappear. What is relevant is 
that voters may HAVE to keep their receipt or... suffer retaliation...
not get paid... lose their jobs... not get a promotion... etc. Also
relevant is that voters may WANT to keep their receipts, for the same
reasons.

 It seems a legitimate priority for a voting system to be designed to
 assure voters that the system is working. 

As long as this does not go against the 'first law' for public voting 
systems: voters must not be linkable to ballots.

The 'second law' also takes precedence: ballots are always secret, only
vote totals are known and are known only after the election ends.

 What I see in serious
 voting system research efforts are attempts to build systems that
 provide both accountability and privacy, with minimal tradeoffs.

There is no tradeoff prossible for voter privacy and ballot secrecy.
Take away one of them and the voting process is no longer a valid
measure. Serious voting system research efforts do not begin by
denying the requirements.

 If some kind of tradeoff between accountability and privacy is inevitable,

There is no such principle.

 in an extreme scenario, I'd still prefer the option to make the tradeoff for
 myself, rather than have the system automatically choose for me.

You don't have this option when the public at large is considered, for
a public election. You can do it in a private election for a club,
for example, but even then only if the bylaws allow it.

Cheers,
Ed Gerck



Re: voting

2004-04-15 Thread Ed Gerck


John Kelsey wrote:
 
 At 11:05 AM 4/9/04 -0400, Trei, Peter wrote:
 
 1. The use of receipts which a voter takes from the voting place to 'verify'
 that their vote was correctly included in the total opens the way for voter
 coercion.
 
 I think the VoteHere scheme and David Chaum's scheme both claim to solve
 this problem.  The voting machine gives you a receipt that convinces you
 (based on other information you get) that your vote was counted as cast,
 but which doesn't leak any information at all about who you voted for to
 anyone else.  Anyone can take that receipt, and prove to themselves that
 your vote was counted (if it was) or was not counted (if it wasn't). 

The flaw in *both* cases is that it reduces the level of privacy protection
currently provided by paper ballots.

Currently, voter privacy is absolute in the US and does not depend
even on the will of the courts. For example,  there is no way for a
judge to assure that a voter under oath is telling the truth about how
they voted, or not. This effectively protects the secrecy of the ballot
and prevents coercion and intimidation in all cases.

Thus, while the assertion that Only if all the trustees collude can
the election be defrauded may seem to be reasonable at first glance, it
fails to protect the system in the case of a court order -- when all the
trustees are ordered to disclose whatever they know and control.

Also, the assertion that All of this is possible while still m
aintaining voter secrecy and privacy essential to all public elections 
is incorrect, for the same reason.

Moreover, the assertion that Vote receipts cannot be used for vote 
selling or to coerce your vote is also incorrect, for the same reason.

These shortcomings do not depend on any specific flaw of a shuffling
process, a TTP, or any other component of either system. Rather, it is 
a design flaw. A new election system should do no harm -- reducing the 
level of voter privacy and ballot secrecy should not be an acceptable 
trade-off for changing from paper to electronic records, or even
electronic verification.

Court challenges are a real scenario that election officials talk about 
and want to avoid. Without making voter privacy inherently safe from court
orders, voter privacy and ballot secrecy are at the mercy of casuistic, 
political and corruption influences -- either real or potential. When the 
stakes are high, we need fail-safe procedures.

Now, you may ask, is there any realistic possibility of a court order 
for all trustees to reveal their keys?

Yes, especially in a hot and contested election -- and not only Bush vs.
Gore. Many local elections are very close and last year an election
in California was decided by *one* vote. 

For example, the California Secretary of State asked this as an 
evaluation question, when they were testing voting systems for the 2000 
Shadow Election Project.

The question was whether and to what extent the voting system could be 
broken under court order  – for example, if some unqualified voters 
were wrongly allowed to vote in a tight election and there would be a 
court order to seek out and disqualify their votes under best efforts.

Perhaps a trustee could be chosen who would be immune even from a US
court order?

Well, not for a US election, which is 100% under state and/or federal 
jurisdiction.

But there are additional scenarios -- a bug, Trojan horse, worm and/or 
virus that infects the systems used by all trustees would also 
compromise voter secrecy and, thereby, election integrity.

Cheers,
Ed Gerck



not really, Re: Run a remailer, go to jail?

2003-04-01 Thread Ed Gerck
On Fri, Mar 28, 2003 at 01:10:56PM -0500, Perry E. Metzger wrote:

 http://www.freedom-to-tinker.com/archives/000336.html

 Quoting:

 Here is one example of the far-reaching harmful effects of
 these bills. Both bills would flatly ban the possession, sale,
 or use of technologies that conceal from a communication
 service provider ... the existence or place of origin or
 destination of any communication.

Frankly, I'm puzzled by the reactions to this. The text specifically talk
about technologies, not humans. And, practically, the only civilian
use technology it applies to is spam.  It does not apply to NAT, with due
respect to contrary opinions in the list, because NAT does not hide the
originating or destination IP. That IP is the place of origin/destination
of all packets of the translated network. It also does not apply to
remailers, for the same reason -- the source/destination is that
remailer.

But, someone may ask, isn't a human the eventual origin/destination?
Perhaps so, but the fact is that -- by definition -- *all* technologies
stand in the middle and effectively conceal from a communication
service provider the existence or place of origin or destination of
any human involved in the communication. Humans can't send
electrons in the wire, airwaves in the ether -- there is always a
piece of technology in-between.

Cheers,
Ed Gerck



Re: QuizID?

2002-10-17 Thread Ed Gerck
This solution, like others based on the same principle, may not
scale past ~150,000 users because of clock drift problems.

Cheers -- Ed Gerck

Marc Branchaud wrote:

 Any thoughts on this device?  At first glance, it doesn't seem
 particularly impressive...

 http://www.quizid.com/

 Lovely idea of two-factor authentication:

The user then enters their user name (something they know) and the
8-digit Quizid passcode (something they have) into the login screen
of their application.

 BBC NEWS | Technology | Handy future for online security
 http://news.bbc.co.uk/1/hi/technology/2334491.stm

 Excerpt from the BBC article:

Users are issued with a card and a personal code, based on a set of
colour keys on the card. Each time they wish to conduct a secure
transaction, they punch in the colour code and a random number is
generated.

 M.

 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]




Re: TCPA / Palladium FAQ (was: Re: Ross's TCPA paper)

2002-06-26 Thread Ed Gerck

Interesting QA paper and list comments. Three
additional comments:

1. DRM and privacy  look like apple and speedboats.
Privacy includes the option of not telling, which DRM
does not have.

2. Palladium looks like just another vaporware from
Microsoft, to preempt a market like when MS promised
Windows and killed IBM's OS/2 in the process.

3. Embedding keys in mass-produced chips has
great sales potential. Now we may have to upgrade
processors also because the key  is compromised ;-)

Cheers,
Ed Gerck

PS: We would be much better off with OS/2, IMO.

Ross Anderson wrote:

 http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html

 Ross

 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]