Belenios: A Verifiable Online Voting System
Belenios is an online voting system ensuring vote privacy and verifiability, recently updated to version 2.5.1, enhancing security and user experience while supporting various voting methods and languages.
Read original articleBelenios is a verifiable online voting system designed to ensure vote privacy and verifiability, making it suitable for various elections, including referendums. The platform employs encryption to protect voter anonymity and allows voters to confirm their votes have been counted. Recent updates include the release of Belenios 2.5.1, which addresses an issue with the Distributed Key Generation scheme, enhancing security by adding an extra signature field. Previous versions introduced features such as a restricted mode for security compliance, improved voter credential management, and a new admin interface for easier election setup. Belenios supports various voting methods, including preferential voting and weighted votes, and has expanded its language offerings. The platform has undergone numerous updates since its inception, focusing on security enhancements, user experience improvements, and compliance with regulations like GDPR. The system is hosted on a new public server to improve availability, and the development team encourages user feedback and contributions, particularly in translation efforts. Belenios aims to provide a robust and user-friendly solution for online voting, ensuring transparency and security in the electoral process.
Related
Arrow's Impossibility Theorem [video]
The video discusses the importance of selecting a fair voting system for accurate representation in elections. It explores different systems, Arrow's theorem, and a scenario where one voter can dominate candidate rankings.
Ranked choice is 'the hot reform' in democracy. Here's what you should know
Roughly 50 American jurisdictions have adopted ranked choice voting, aiming to reduce toxicity, offer diverse ideas, and promote moderation. Alaska and Maine showcase benefits, but critics fear bias and confusion. Momentum grows with Nevada and Oregon considering adoption.
Veles: Open-source tool for binary data analysis
Veles is an open-source binary analysis tool by CodiSec, aiding in visualizing and analyzing binary data. It offers a hex explorer, data visualization, and extensibility through Python functions. Continuously updated since 2016, Veles supports Windows, Linux, and macOS.
Venezuela wants to end a dictatorship via Open Sourcing their elections
On July 28, 2024, Nicolas Maduro was declared the winner of Venezuela's presidential election, but opposition claims and transparency initiatives have raised questions about electoral integrity and public trust in the process.
What are the odds, II: the Venezuelan presidential election
Mathematician Terence Tao analyzed the Venezuelan presidential election results, finding anomalies suggesting potential vote manipulation. His Bayesian probability assessment raises concerns about the legitimacy of reported vote totals.
- Trust and Legitimacy: Many commenters emphasize that trust in the voting process is more crucial than mere verifiability, arguing that without trust, elections lack legitimacy.
- Vote Selling and Coercion: Several comments highlight the risks of vote selling and coercion inherent in online voting systems, questioning their ability to protect voter privacy.
- Physical Presence: There is a strong sentiment that requiring physical presence at polling stations is important for preventing fraud and ensuring voter engagement.
- Technical Vulnerabilities: Commenters express skepticism about the security of digital voting systems, citing potential issues like Sybil attacks and the integrity of electronic ballot machines.
- Preference for Traditional Methods: A number of users advocate for traditional paper ballots and in-person voting as more reliable and secure alternatives to digital systems.
This is something all digital systems are really bad at, even if everything is readable and verifiable, unless all your members know how to read that code.
Edit: and even if they know how to read that code, can they trust the machines are running that code at the big day?
There are two problems with this: 1. You can’t verify extra or in eligible voters voted. 2. It relies on trust that to tell you your vote was counted.
I am very interested in reading about this protocol, and it might make a fun hobby to re implement it as a research project.
The one issue I have is: the act of physically showing up is an important one. Mass stuffing of ballot boxes is nearly impossible when physical presence is required. It also puts ‘your ass in the game’, meaning you really care so to speak; as you have to do a minor piece of physical labor in order to get your vote counted.
If this protocol could be adapted to the physical world, I think it would be perfect barring any other issues.
The future of paper voting can be something like a quick fingertip-actuated DNA sequencer which will imprint your DNA hash right into the paper ballot, but it will never be an effective system on top of the current network architecture. You have to show up personally to vote. Like can you imagine voting with SMS or something? This is complete non-sense.
However I think this tool would work pretty good on a smaller community scale.
Like most (or all?) online protocols, this doesn't protect against vote selling or vote coercion.
The only way to trust voting machines (which could be rigged before delivery), would be to physically watch which buttons the voters did press, and manually account it... which would violate the core rule of anonymity, that to avoid retaliation.
Electronic voting system must be prohibited across the board. Every system is vulnerable, electronic system are all remote controllable, I much prefer to have a person within the jurisdiction to go after than someone outside of it.
I don't understand howhy it's ever made out to be more complex than that.
Obviously not something that seems reasonable for government implementation, but this seems like it would be great for soliciting a specific kind of feedback about a project or business. Board elections, or product reviews from third party stakeholders, or stuff like that.
Truly auditable voting is definitely a tough enough problem that I'd never want to tackle it myself, so I'm glad this is available should I ever find a use for it!
Another problem with electronic voting is that votes can be bought or people might be pressured to vote specific way. The voter might save hashes/keys as a proof that they voted for a certain candidate and this can be used as a basis for payout or not being punished.
We wrote a whole bunch on the topic here (again, use automatic translation) https://eglasovanje.si/vsi-clanki
Seems like this would solve the ballot stuffing issues as well as being easily electronically verifiable, it's just not a fully digital solution
Then, the voter can vote using their root key, reversing all the sold votes and cast a vote for their preferred candidate.
Vote selling problem solved.
What does it want in a password? Would be nice if it actually listed out the requirements from the get go.
The Belenios voting system is one of the E2E verifiable ones that allows the voter to ensure that their vote is correctly counted without submitting trust to a third party, which is necessary to prevent a corrupt election authority from deceiving and manipulating election results. However, it is also one of the underperforming ones in terms of usability. Like most of the existing E2E verifiable systems, deployability is a logistical nightmare if one wants to safeguard both privacy and resistance against sabotage.
In particular, if I understand correctly, individual verifiability is ensured through a challenge where the voter, after casting a vote to the server, has a chance to test the voting client by challenging it with revelling encryption exponent to the server, which then can decrypt the vote and show it on the screen. This one is a bit concerning in itself, as the voting client can decide to manipulate only votes cast for one candidate. Whereas checking and casting the same vote again would reveal the vote to potentially corrupt authority. Imagine explaining to ordinary voters such verifiability guarantees. There are better systems where one can get a tracking number at the end of the vote and check it with all cast votes when they are decrypted (one can look up Selene).
Another issue with the system and all existing E2E verifiable voting systems is the deployment of a threshold decryption ceremony. To recap for everyone. Before the elections, the authority manages the creation of a shared public key between multiple parties, which voters use to encrypt their votes during the vote. After the vote, all encrypted votes go through reencryption mixes or are homomorphically tallied and then finally, the votes are threshold decrypted. The challenge here is choosing the redundancy threshold of a number of all parties that need to come together to decrypt the election result. If too few come together, the election result can remain undecrypted, whereas if the hold is set too low, a small minority could collude and see how everyone has voted. Hence, securing both privacy and robustness is an expensive activity.
The website offers the service for those who don’t want to deploy the system themselves. The issue is that the voters’ privacy is handed over to the running service. There is no way to verify to what extent the parties used by the organisation are truly independent and would safeguard their vote privacy.
My biggest gripe is that theese arguments don’t land well to thoose who are acustomed to mathematical formalism of security definitions and proofs. The E2E verifiability with strong privacy guarantees can also be achieved in expoinentiation mix setting wihtout the need to threshold decryption ceremony [1, 2]. Receipt freeness is still an unresolved challenge here, but I see a path to resolve it with ideas similar to those used in Selene. Whereas if you are concerned about fairness not being distributed between multiple parties, please explain to me an attack vector there that can’t be accounted for!
[1]: https://www.usenix.org/legacy/events/evtwote11/tech/final_fi...
Verifiability
Absolute Privacy between the above two
Sounds like Time, Money, Resource: only pick two.
As long as we trust "certificate authorities", this is pure bulshit.
In the US right now, our problems are well understood and primarily relate to ensuring that only legally eligible people vote, and that the vote was cast by that actual person.
These are fundamentally not technical problems. We have known about them for decades if not centuries and as recently as the early 2000s the Carter-Baker commission laid out the problems and the relatively straightforward solutions.
There have always been political “machines” in big cities, and if given the opportunity, they will try to stuff ballot boxes, intimidate voters, harvest ballots, exclude observers, apply voting laws unequally, and do any number of other shenanigans to give their party an advantage.
This has reached epic proportions since mail-in ballots for able bodied voters was normalized during COVID.
And the problems have all been exacerbated by the unwillingness of the courts to force states to abide by their own voting laws.
Election administration is not difficult, it is a straightforward set of tasks that require diligence and integrity, and that benefits greatly from having highly motivated partisan observers at every stage of the process.
Technology currently used in voting mostly just introduces more ways to mess up elections either intentionally (via manipulation, by administrators or hackers) or accidentally (as via bugs).
The fixes as I said, are simple but inconvenient:
1. Diligently clean voter rolls every year, or even throw them out and restart every year
2. Strongly authenticate voters via in-person registration with trusted nonpartisan agents (government officials) and verify eligibility to vote (citizenship, residency, age, selective service)
3. Vote in person. If intimidation is known to be a problem in a precinct, bring in state police (not local). Note that machine precincts are likely determinable via statistical and electoral analysis, eg where can small swings have big electoral impact). You don’t have to fortify everywhere.
4. Check voter id at the polls.
5. Paper ballots, hand counted on the day of election.
6. Invalidate the count and require revote from any precinct that counts any vote not in the presence of partisan observers from any party on the ballot that asks. Do not allow any vote to be counted after results are reported; the remedy for custody mistakes and “finding uncounted votes” is re-vote.
7. Publicly post precinct level results BEFORE reporting to the county or state. Publicly post county results before reporting to the state. This allows independent channels to confirm that tallies at the county or state level are not tampered with or inadvertently miscomputed.
8. Fast track any election challenge hearings from any eligible voter in an election and do not allow judges to reject cases due to standing, mootness or laches.
9. Absentee ballots should be rare and require proof of need and extraordinary verification with partisan monitoring.
Related
Arrow's Impossibility Theorem [video]
The video discusses the importance of selecting a fair voting system for accurate representation in elections. It explores different systems, Arrow's theorem, and a scenario where one voter can dominate candidate rankings.
Ranked choice is 'the hot reform' in democracy. Here's what you should know
Roughly 50 American jurisdictions have adopted ranked choice voting, aiming to reduce toxicity, offer diverse ideas, and promote moderation. Alaska and Maine showcase benefits, but critics fear bias and confusion. Momentum grows with Nevada and Oregon considering adoption.
Veles: Open-source tool for binary data analysis
Veles is an open-source binary analysis tool by CodiSec, aiding in visualizing and analyzing binary data. It offers a hex explorer, data visualization, and extensibility through Python functions. Continuously updated since 2016, Veles supports Windows, Linux, and macOS.
Venezuela wants to end a dictatorship via Open Sourcing their elections
On July 28, 2024, Nicolas Maduro was declared the winner of Venezuela's presidential election, but opposition claims and transparency initiatives have raised questions about electoral integrity and public trust in the process.
What are the odds, II: the Venezuelan presidential election
Mathematician Terence Tao analyzed the Venezuelan presidential election results, finding anomalies suggesting potential vote manipulation. His Bayesian probability assessment raises concerns about the legitimacy of reported vote totals.