ACCURATE - PowerPoint PPT Presentation


PPT – ACCURATE PowerPoint presentation | free to download - id: c2b58-ZDc1Z


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation



What are the limits of cryptographic voting? What is the best we can do? ... ... Vulnerable voting technology. Integrity of democracy ... – PowerPoint PPT presentation

Number of Views:17
Avg rating:3.0/5.0
Slides: 2
Provided by: sbri
Tags: accurate | voting


Write a Comment
User Comments (0)
Transcript and Presenter's Notes


Michael Byrne, Dan Boneh, David Dill, Doug Jones,
Deirdre Mulligan, Peter Neumann, Avi Rubin
(Director), David Wagner, Dan Wallach (Associate
Director), Brent Waters
  • A Center for Correct, Usable, Reliable,
  • and Transparent Elections
  • http//
  • Motivation
  • Vulnerable voting technology
  • Integrity of democracy threatened
  • Coordination need in voting ecosystem

Center External Coordination
  • Systems Level Perspective
  • The Voting System Lifecycle
  • trusted system development cycle
  • An Election Cycle
  • single use of this trusted system
  • Data Paths Must be Secured
  • the distributed system view
  • From Voter to Canvass
  • technology matters in the chain of trust

Specific Technology Investigations
  • Usability Accessibility
  • Systems must be objectively usable and perceived
    as usable.
  • Need to establish baselines for existing voting
    systems (optical scan, traditional paper, etc.)
  • Assess interactions between systems and
    subpopulations of voters
  • New systems should be no worse than current ones
  • Synthesize that knowledge and generate
    Guidelines and Evaluation tools.
  • Role of Cryptography
  • Can cryptography help build a trustworthy system
    out of untrusted components?
  • What are the limits of cryptographic voting?
    What is the best we can do?
  • How can we make cryptography accessible to and
    usable by the public?
  • How do we build secure cryptography protocols
    where humans play a role?
  • Can cryptographic systems provide higher
    integrity than other systems?
  • Design for Verification
  • What can we do, before they are used, to make
    sure systems are trustworthy?
  • Design in (formal) verifiability.
  • Combine automated deduction, model checking,
    program analysis technology.
  • Focus on isolation of code for critical
    properties, to make verification easier.
  • Use formal verification technology to amplify
    efficiency of software testing.
  • Authenticate system software/hardware.
  • Policy
  • Embedding Policy in Technology
  • Conformance tools Standards, Certification,
  • How do we evaluate these tools?
  • Pre-requisites for optimal functioning?
  • Necessary but not sufficient?
  • Updating Policy with Technology
  • Insufficient attention to technology changes
  • Reactive nature of law