ACCURATE - PowerPoint PPT Presentation

Loading...

PPT – ACCURATE PowerPoint presentation | free to download - id: c2b58-ZDc1Z



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

ACCURATE

Description:

What are the limits of cryptographic voting? What is the best we can do? ... http://accurate-voting.org ... Vulnerable voting technology. Integrity of democracy ... – PowerPoint PPT presentation

Number of Views:17
Avg rating:3.0/5.0
Slides: 2
Provided by: sbri
Category:
Tags: accurate | voting

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: ACCURATE


1
ACCURATE
Michael Byrne, Dan Boneh, David Dill, Doug Jones,
Deirdre Mulligan, Peter Neumann, Avi Rubin
(Director), David Wagner, Dan Wallach (Associate
Director), Brent Waters
  • A Center for Correct, Usable, Reliable,
    Auditable,
  • and Transparent Elections
  • http//accurate-voting.org
  • Motivation
  • Vulnerable voting technology
  • Integrity of democracy threatened
  • Coordination need in voting ecosystem

Center External Coordination
  • Systems Level Perspective
  • The Voting System Lifecycle
  • trusted system development cycle
  • An Election Cycle
  • single use of this trusted system
  • Data Paths Must be Secured
  • the distributed system view
  • From Voter to Canvass
  • technology matters in the chain of trust

Specific Technology Investigations
  • Usability Accessibility
  • Systems must be objectively usable and perceived
    as usable.
  • Need to establish baselines for existing voting
    systems (optical scan, traditional paper, etc.)
  • Assess interactions between systems and
    subpopulations of voters
  • New systems should be no worse than current ones
  • Synthesize that knowledge and generate
    Guidelines and Evaluation tools.
  • Role of Cryptography
  • Can cryptography help build a trustworthy system
    out of untrusted components?
  • What are the limits of cryptographic voting?
    What is the best we can do?
  • How can we make cryptography accessible to and
    usable by the public?
  • How do we build secure cryptography protocols
    where humans play a role?
  • Can cryptographic systems provide higher
    integrity than other systems?
  • Design for Verification
  • What can we do, before they are used, to make
    sure systems are trustworthy?
  • Design in (formal) verifiability.
  • Combine automated deduction, model checking,
    program analysis technology.
  • Focus on isolation of code for critical
    properties, to make verification easier.
  • Use formal verification technology to amplify
    efficiency of software testing.
  • Authenticate system software/hardware.
  • Policy
  • Embedding Policy in Technology
  • Conformance tools Standards, Certification,
    Testing
  • How do we evaluate these tools?
  • Pre-requisites for optimal functioning?
  • Necessary but not sufficient?
  • Updating Policy with Technology
  • Insufficient attention to technology changes
  • Reactive nature of law
About PowerShow.com