-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ballot Stuffing #29
Comments
I believe this is (mostly) correct. The verifiability model for eVote requires that there be a declare size of the voter pool that can be generally verified. I do not think that the actual membership list needs to be disclosed, but its size does, and that size needs to be verifiable. So posit a malicious Election Administrator for a 1000 person organization. To make any and all fraud by the EA uniformly detectable in principle we would need:
Let's look at the attack potentials by a malicious EA.
|
All of that is true, given a set of voters which will all vote or attempt to vote as well as an election administrator who hasn't previously administered votes for the same organization and doesn't know who historically does not vote. Even without creating extra users, given a history of ballots that barely reach or exceed 50% of the electorate, the administrator could extrapolate from history whether or not an individual will vote. Again, without those prior ballots being available (for others to see who historically votes and who doesn't) no one would notice that someone who hasn't voted in 5 or 7 years is now voting. Nor do I think that's necessarily an indicator of fraud. |
How does Helios prevent this? Do you have a recommendation for preventing this? |
I wasn't comparing to Helios, but this could be mitigated somewhat with Helios. Helios makes public the list of voters (by alias) and the cryptographic proof of their vote. Provided a stable group of electors and a stable sorting order, the voter aliases could be used to identify fraud, e.g., V1 did not vote this year, or the 9 years prior. Next year V1 does vote, that might be worthy of investigation. In reality, however, most organizations grow year over year, so the aliases aren't a reliable method. |
The comparison is important for me because, independently on what the PSF does, if Helios has feature eVote does not have, I want to add that feature. In eVote we do publish the information about who has voted and who has not voted. Is that different? |
I'll preface, of course, by noting again that @sigmavirus24 is an honest, intelligent, and careful EA. In the PSF case I would not lack actual confidence if the procedure were "Email your vote to Ian with full return address in the header, then trust him." That said, we are discussing the threat model of a malicious EA (Mallory), not of Ian. The characterization of a potential fraud is not actually possible without probable detection. The assumption in our model is that Mallory faces a negative consequence for being detected in a fraud which is more significant than her benefit from succeeding in a fraud (or at least highly significant).
The two flaws in this attack by Mallory are:
Obviously, one can use a psychological hunch that someone who didn't vote probably didn't verify. But that is only fairly likely. So an EA attack to substitute 1 vote is unlikely to be detected. A substitution of 2 votes is much more likely to be detected. And so on asymptotically as the number of fake votes are substituted. The cumulative probability of at least one detection nears 1.0 pretty fast as the number of fakes increases. |
Let's posit an election for a large organization in which the list of eligible voters is not available to all of the membership for audit purposes. If we start with the premise that the administrator is looking to control the result of an election. Without complete transparency with the list of voters, an election administrator could add voters and emails that use address extensions to send themselves enough ballots to stuff the box in their favor.
The database can be made public after an election, yes, but any organization unwilling to publish the list of voters and their addresses is likely to be unwilling to publish the databases with that same information.
The text was updated successfully, but these errors were encountered: